A public beta version of our RRAS Detector is here

detection face

After extensive internal development and testing, we now proudly present our public beta version of a Syspeace detector for Microsoft Routing and Remote Access Service. What is Routing and Remote Access Services? “RRAS”, as it is often known, is a component in Windows Server to provide a VPN so that internal servers can be accessed […]

Read more

How to get the next generation to become professional cyber defenders

October has ended and so has the EU’s annual advocacy campaign “European Cybersecurity Month (ECSM)”. The campaign aims to raise awareness of cybersecurity threats. That includes promoting cybersecurity among citizens and providing up to date security information through education and good practices. Hundreds of cyber-related activities are organized throughout Europe every year during this month. Unfortunately, […]

Read more

DevSecOps – Where Collaboration is key

Collaboration is Key in DevSecOps

We hear many people talk about DevOps and SecOps. The DevOps wants to develop a strategy that bridges the gap between software development and IT operations. The team works with design, development, testing, implementation or deployment and maintenance. Security is normally introduced in the later stages. Somewhere between testing and deployment or even later.  But […]

Read more

Is the NIST Cybersecurity Framework for me?

Helping hand through the screen

As cybersecurity continues to increasingly be at the top of everyone’s mind, the knowledge about how brute force attacks directly is linked to business risk is growing. Mitigating these risks does not solve the complete problem but it lowers the exposure to an increasingly more professional cyber crime community. To get the best cybersecurity standard, […]

Read more

Bang for the buck – calculating the ROI of cybersecurity

  The cybercrime business – just like any other business – looks at their return on investment. If an attack does not not yield results, more than 60 percent of hackers will move on within 40 hours, since hackers have become corporate in their behavior, balancing costs, risks and effort. You are in competition with […]

Read more

Unprepared and exposed – welcome to the grim present of cybercrime

A study from Juniper Research foresees that an enormous amount will come from fines related to breaches of General Data Protection Regulation (GDPR), California Consumer Privacy Act (CCPA) and any other data privacy laws. At the same time, a 70 percent increase in cybercrime is predicted until 2024. A lot of the advanced cyberattacks of […]

Read more

Cybercrime: How our demographics makes us the target

Dart - three arrows in red.

Reading this, you are probably in the riskiest region to be online, namely Northern Europe or North America.  Protection, such as legal and technical measurements on a country level has some effect – having a low score on Global Cybersecurity Index (GCI) corresponds with less vulnerability – but other factors, like high income, has more […]

Read more

Optimize the Software Development Process using Leavitt’s Diamond

Optimize the Software Development Process using Leavitts’ Diamond

Producing top-quality software derive from excellent design. Excellent design depended on people who understand effective technology development as well as the field in which the application will be used.   In short, people, process, and technology are a necessary condition of success. The model, originating from the research of Harold Leavitt, focuses on how people […]

Read more

Creating change and business value with technology

How do you implement a new technology platform? By installing the software. Any IT-department can do it. How do you successfully implement a new technology platform? Well, that requires a bit more. One way is to consider Harold Leavitt’s Diamond Model and its three* perspectives for creating organizational change.  Process; as in the organization of people […]

Read more

Are your clients’ payments, medical records and data secure? [US]

Secure payments medical records and data with Syspeace.

Are you compliant, so that the credit card companies and banks continue to allow transactions? Are you ahead of security concerns, or do you struggle to keep up? Two weeks unable to take payments, what would that do to your business?  In this time of increasing level of cybercrimes, rules and regulations are a stepping […]

Read more

1 2 3 4
top