Responding to a cyber incident – a guide for CEOs

Intended Audience for This Guidance This guidance is designed for CEOs operating in both public and private sectors to effectively navigate a cyber incident. It outlines critical considerations to address at the onset and throughout the incident response process. The Importance of This Guidance In the wake of a significant cyber attack, organizations face numerous…

Read More

Responding to a cyber incident – a guide for CEOs

Who Should Follow This Guidance? This guidance is designed to assist CEOs from both public and private sectors in effectively managing a cyber incident. It outlines key considerations to address at the onset of an incident and throughout its progression. Why Is This Guidance Important? In the aftermath of a significant cyber attack, organizations face…

Read More

ROCA: Infineon TPM and Secure Element RSA Vulnerability Guidance

Overview This guide offers insights for individuals seeking to understand and mitigate the effects of the vulnerability known as ROCA (Return of Coppersmith’s Attack). This vulnerability is present in Trusted Platform Modules (TPMs) and Secure Elements (SEs) manufactured by Infineon Technologies AG. ROCA was publicly announced by Microsoft on October 10. Initial findings by the…

Read More

ROCA: Infineon TPM and Secure Element RSA Vulnerability Guidance

Overview This document provides important guidance for understanding and mitigating the risks associated with the ROCA (Return of Coppersmith’s Attack) vulnerability. This vulnerability affects Trusted Platform Modules (TPMs) and Secure Elements (SEs) manufactured by Infineon Technologies AG. The ROCA vulnerability was publicly disclosed by Microsoft on 10 October, with researchers releasing initial details of their…

Read More

ROCA: Infineon TPM and Secure Element RSA Vulnerability Guidance

Understanding the ROCA Vulnerability This page serves as a guide for individuals seeking to comprehend and mitigate the effects of the vulnerability known as ROCA (Return of Coppersmith’s Attack). This vulnerability exists within Trusted Platform Modules (TPMs) and Secure Elements (SEs) developed by Infineon Technologies AG. ROCA was publicly disclosed by Microsoft on October 10….

Read More

Secure communications principles

Today’s technology offers numerous ways to communicate in professional settings, encompassing voice calls, email, group messaging, and video meetings. This guidance presents a collection of principles designed to assist organizations in making informed security choices when selecting secure communication products and services. Targeted at risk managers and security experts, this guidance facilitates the evaluation of…

Read More

Using IPsec to protect data

This document offers comprehensive guidelines on selecting and configuring equipment that utilizes IPsec. It outlines how to design, operate, and maintain a network encryption service powered by IPsec to ensure adequate security for safeguarding personal, enterprise, and government data classified as OFFICIAL-tier. The recommendations focus on enhancing both security and user-friendliness. Overview of This Guidance…

Read More

Using IPsec to protect data

This document outlines best practices for selecting and configuring IPsec-enabled equipment. It also details the design, operation, and maintenance of a network encryption service utilizing IPsec to ensure adequate security for personal, enterprise, and OFFICIAL-tier government data. The guidelines provided focus on balancing security and usability. Overview of This Guidance This guidance is intended for…

Read More
Back To Top