Security

Halocore Secude – Data security solution for ERP SAP application

SECUDE HALOCORE provides a unique technology that protects intellectual property and other sensitive information extracted from SAP systems. By integrating directly with SAP, IT...

Warning sites impersonating bank in Vietnam

In 2017, according to the CyRadar system, quite a lot of new domain were registered for the purpose of faking banks in Vietnam. These...

Decree No. 58/2016/ND-CP Juy 01, 2016 on the sale and Provision of civil crytography...

On implementation of the Law on network information security dated November 19, 2015, on July 1, 2016, the Government promulgated the Decree on the...

CyRadar warns of phishing attacks against Facebook users

On August 24, CyRadar detected a Facebook phishing campaign on a large scale. This campaign was from Messenger, pretending Youtube and tricking the user...

Privileged Account Security Solution (Part 2)

Organizations need to closely control the privileged accounts. Tracking all activities of these types of accounts will minimize security risks and provide regulations that...

Situational Awareness Management System SAMS (Part 1)

PART 1: Introduction The Situational Awareness Management System (SAMS) provides necessary means for the integration, management and control of all components of the surveillance system. Using...

Expert opinions about two big cyber attacks in history

Information security always plays an important role in organizations and businesses, and risks such as leakage, or loss of data will have a significant...

Monitoring and protecting ERP system – Part 2

Part 2: Proposed Solutions Maintain system security Components of the system: operating system, database application and management systems, may contain vulnerabilities that allow hackers to get...

Monitoring and protecting ERP system – Part 1

Part 1 – Risk from leaking data of ERP system Introduction The Enterprise Resource Planning (ERP) system is the enterprise's centralized management system, which brings...

SCADA network system security (Part 1)

Potential threats The management systems of industry, manufacturing and providing utility services such as electricity, oil, water, etc. are operated by electrical-electronic, mechanical, hydraulic equipment...

New posts

Popular posts