Articles by Cert-IST
Cert-IST writes articles in which it analyzes the IT security news. These articles are first published in the monthly bulletin sent to its members. A couple of months later some of these articles are made public in this section of the website.
9 article(s) - 2012
![Twenty critical security controls for effective cyber-defense](/pub/images/imageDoc/imageDoc02.png)
![Fighting rootkits on Windows 64-bit platforms](/pub/images/imageDoc/imageDoc16.png)
![Report for the SSTIC 2012 conference (Part 2)](/pub/images/imageDoc/imageDoc16.png)
![Report for the SSTIC 2012 conference (Part 1)](/pub/images/imageDoc/imageDoc16.png)
![A Trojan uses Sendspace to store stolen documents](/pub/images/imageDoc/imageDoc20.png)
![Adobe Reader X: is the sandbox feature effective?](/pub/images/imageDoc/imageDoc20.png)
![JSSI 2012 conference overview](/pub/images/imageDoc/imageDoc30.png)
![RSA recommendations about APT attacks](/pub/images/imageDoc/imageDoc08.png)
![Cyber-attack: the Stratfor case](/pub/images/imageDoc/imageDoc02.png)