Tag: mobile number list

The backdrop of sanctions and restrictions Large banks assesse how the schemes and intensity of fraudulent attacks on customers have change in March against the backdrop of the imposition of sanctions and restrictions on certain banking operations. The VTB representative notes that the situation in the banking market has change significantly in February-March this year…

OF the key characteristics of cloud computing. In most traditional data centers Engineers’ access to servers is controlle at the physical level; in cloud environments they work via the Internet. Delimiting access control and ensuring transparency of changes at the system level is . one of the main criteria for protection.  Security and fintech Alexander…

MSS market is growing at an average of % per year. According to Ruslan Kosarim one of the most important market development trends is controlle detection and response. The nee for MDR or SOC services due to the development of malware and the increase in the scale of attacks is growing and will continue to…

Analytics and improves its efficiency makes it possible to block new malicious code almost instantly and spees up the sandbox. Another endpoint mitigation technology is FortieR response automation. It can detect malware not only at the penetration stage but also after it has settle in the system. The results of independent tests showe that only…

LAN test results Test results are disappointing. In % of cases potentially dangerous resources are not blocke; outdate vulnerable solutions are use to filter traffic. The share of parasitic traffic reaches % including % – torrents and PP networks .% – advertising .% – entertainment news .% – cartoons .% – computer games .% –…

A Soft-liner Company According to him the danger may lie in the fact that users will start downloading applications not from the official websites of banks but from external. Resources like the Top Android Applications. Unofficial file hosting services will also appear on which it will allegely be possible to download a fully functioning banking…

Head of Consulting and Audit Department of Angara Security Alexander Khonin on standardization in IT Standardization is by default an important process as it allows you to regulate the rules of the game. We see that many new documents regarding information security have been release lately. Given the growing role of information security this is…

Tools integrate security tools etc. This trend will also be facilitate by initiatives from relevant departments and the professional community such as the creation of a Russian software marketplace the consolidation of software and hardware registries grants for the implementation domestic IT solutions. Despite the conflicting assessments of experts we see OpenSource as one of…

OF implementing a Russian solution to protect communication. channels simultaneously in several districts of the Russian Feeration in less than one month of work. Oleg Slyadnikov (Interprokom): Until recently customers were not ready to completely abandon existing foreign. software for various reasons: investments in legacy systems unique functionality. a large number of application solutions that…

Is Supported By The Rdtex Training Center Which Trains Specialists In Postgresql And Other Free Solutions Including Domestic Ones. Demand For Training In Relevant Products Is Also Showing Strong Growth. Alexander Rozhkov (T): Even During The – Pandemic Our Customers . Did Not Suspend Large Projects Related To The Need For Digital Transformation. The Infrastructure…