Select Page

PCI Compliance hosting

In my earlier post about PCI Compliant Hosting, we have discussed about the PCI Compliance areas to be looked into when considering a hosting service provider. In this post, I would like to cover the scope and some of the key aspects of hosting to ensure you have the...

First EU-report on Maritime Cyber Security

ENISA has published the first EU report ever on cyber security challenges in the Maritime Sector. This principal analysis highlights essential key insights, as well as existing initiatives, as a baseline for cyber security. Finally, high-level recommendations are...

Importance of Database Activity Monitoring

Database Activity Monitoring is a key process in the data protection suite of activities. Databases being the key place for data storage, database activity monitoring and additional services such as database firewall, vulnerability virtual patching etc. are key in the...