Security Blog

DDoS

DDOS Distributed Denial of Service: what is it?

DDOS: introduction DDoS: Distributed Denial of Service. Whenver connections overload a server, there’s no more the chance to start new connections. This situation takes place when a lot of compromised systems send at the same time data traffic to the target system, causing its crash. Such an overload could make a server, a website or an online

Women in digital

Swascan on the stage of the #Digital4Her event

Digital4Her Swascan attended the “Startup worth growing” pitching session as part of the #Digital4Her event last 19th of June. As you already know, it has been a great pleasure an honour for us. This opportunity allowed us to pitch Swascan in front of a super-qualified jury, other 9 great start-ups and the European Commission! Digital4Her:

IP address

IP address: introduction and explanation

IP address: introduction You can visualize the IP address or “internet protocol address” in the graphic interface as a numerical label. It allows to univocally identify a host (which is a physical device such as a computer, a printer, a router or a smartphone). The host is connected to a network that uses the internet

Digital4Her

Digital4Her: Swascan will attend the event by the European Commission

Digital4Her – Bruxelles Swascan is pleased to announce its attendance to the pitching session “Startup worth growing” as part of the Digital Single Market Digital4Her event. We are glad to attend such a prestigious event that will take place in Bruxelles. This invitatation to the women-only Digital4Her event testifies how hard Swascan is focusing its efforts on the right

Data processing

Data processing: introduction and explanation

Data processing: definition The fourth article of the new European legislation ( GDPR ) describes data processing as follows: “any operation or set of operations which is performed on personal data or on sets of personal data, whether or not by automated means, such as collection, recording, organisation, structuring, storage, adaptation or alteration, retrieval, consultation,

Data controller

Data controller: explanation of the figure and duties

Data Controller According to what the new Data Protection European Regulation ( GDPR ) states, the data controller – described in article 4 – is: “the natural or legal person, public authority, agency or other body which, alone or jointly with others, determines the purposes and means of the processing of personal data; where the

CyberSecurity Trends

CyberSecurity trends: what is going to happen in 2018?

Top 5 CyberSecurity trends for 2018 CyberSecurity trends: 2018 will surely be an interesting year as far as Cybersecurity is concerned. We already witnessed some big incidents, including data breaches and tumultuous developments regarding cryptocurrencies that led Governments of a lot of countries to issue official directives and implement actions in these directions. CyberSecurity trends: IoT & CyberSecurity threats We should

OWASP Top 10

OWASP Top 10: which are the main threats?

OWASP Top 10 The Open Web Application Security Project or OWASP , as we said in a previous article, is a not-for-profit organisation that aims at providing ‘best-in-class’ application security solutions. Their advices and tools are free, vendor neutral, unbiased yet practical. The organisation also lists the OWASP Top 10 web application security risks to help developers and system