Blog

CREA plus zanimivosti s področja informacijske varnosti

Cyber Security for Board Members

As a Board member you need to understand enough about cyber security so you can have a fluent conversation with your experts. 

Good cyber security is all about managing risks. The process for improving and governing cyber security will be similar to the process you use for other organisational risks. It is a continuous, iterative process.

Read more ...

Sizing Up Your Cyberrisks

Over the past decade the costs and consequences of cyberbreaches have grown alarmingly. The total financial and economic losses from the 2017 WannaCry attack, for instance, were estimated to reach $8 billion. In 2018 Marriott discovered that a breach of its Starwood subsidiary’s reservation system had potentially exposed the personal and credit-card information of 500 million guests.

 

Read more ...

What Are Botnets?

Botnets are groups of malware-infected, Internet-connected devices that perform mundane tasks with precision and speed. They are led by bot masters, aka bot herders, who communicate with a C&C server (a computer that instructs infected devices to carry out attacks and perform other functions) via covert channels, such as Internet Relay Chats (IRCs) and websites.

Each individual connected computer in a botnet is called a zombie because the computer or device owner is generally unaware that their machine is mindlessly performing malicious actions. Botnets can wreak all kinds of havoc—from DDoS attacks to cryptocoin mining, from sending spam to spreading fake news.

Read more ...

How hardware security modules could protect your crypto assets

As a security consultant for blockchain projects at Orbs, one of the recurring concerns I hear from customers is how to protect the private keys of their hot and cold wallets.

A hardware security module (HSM) is a tradition security solution which manages digital keys and is been used widely in PKI environments and in the financial sector.

At first glance, using of a HSM might be the perfect solution for blockchain-based solutions. The HSM generates key pairs, has secure storage, and can off-load cryptographic operations from the entire system.

Read more ...

The Importance of Securing the Blockchain

Blockchain is a technology that promises to change how data is stored and businesses operate. 

It is important to ensure that the blockchain, and the data that it stores, is properly protected.

Store your cryptographic material for blockchain in a Hardware Security Module (HSM).

Read more ...
Page 3 of 3

News

Technical Training for Hardware Security Module (HSM)

utimaco LAN V5 4CREAplus, authorized Utimaco training partner, is going to deliver an online hands-on technical training for hardware security module (HSM), on 3-4 June 2021.

Read more ...

CREAplus Successfully Delivered Training for Utimaco HSM

utimaco LAN V5 4CREAplus, authorized Utimaco training partner, successfully delivered another 2-day online hands-on technical training on hardware security module (HSM), in April 2021.

Read more ...

CREAplus at Locked Shields 2021 with Cynet 360

cynetThe largest international live cyber defense exercise Locked Shields 2021, in which CREAplus experts also participated with the Cynet 360 platform, has successfully come to an end. 

Read more ...

Cyber Security Exercise Locked Shields 2021

u.trust 360CREAplus is a part of the world's largest cyber defense exercise - more than 2000 experts from 30 nations are taking part in the Locked Shields 2021, the largest and most complex international Live-Fire Cyber Exercise organized by NATO Cooperative Cyber Defence Centre of Excellence (CCDCOE). 

Read more ...

u.trust 360 Now With Support for CryptoServer LAN HSMs

u.trust 360With the Utimaco u.trust 360 administration platform you can now remotely access your Atalla AT1000 and CryptoServer LAN V5 hardware security modules (HSMs) for real-time monitoring, configuration or reporting purposes on premises or in the cloud.

Read more ...