Reply Best Practice

DEFENCE AGAINST ATTACKS

Reply Security Pillars

Reply Security Pillars 0

Automotive Cybersecurity

Best Practice

The automotive industry on the Cyber (Security) curve

In a more than ever connected world, the automotive industry is following the fast pace of the new technology. Cars are smarter but also more subject to cybercrime / cyber vandalism with a possible impact on the physical security of people. Spike Reply can help you.​

The automotive industry on the Cyber (Security) curve 0

30.06.2016 / Infosecurity Magazine

Press Article

Software Defined Security: Going Beyond Traditional Measures

Organizations today are evolving and rapidly adopting new technologies. But what this brings is an increase in their threat footprint. Alexander Seyf, Partner at Sytel Reply, explains how organizations now need to look towards leveraging emerging technologies such as Software Defined Networking in order to efficiently and dynamically address security threats and attacks​.

14.06.2016 / Milan

Event

Cyber Security Insights into Markets and Regulations

Spike Reply in collaboration with FireEye organizes the event "Cyber Security Insights into Markets and Regulations". The workshop analyses the Italian Market situation and regulatory changes, providing new approaches to IT Security Governance (threats and risks) introducing real cases.

04.04.2016 / Information Age

Press Article

A Retailer's guide to Cyber security

Retail is in the top five most frequently targeted industries when it comes to cyber-attacks. Daren Ward, Partner at Retail Reply, examines top information security threats faced by the retail sector and the trends resulting from them.​

28.04.2016 / Milan

Event

How to fight back against Cryptolocker

Communication Valley Reply, in collaboration with Cisco, hosts the workshop “How to fight back against Cryptolocker”, on 28 April 2016 at the Reply Cyber Security Command Center​, and ​​focused on the Cryptolocker trojan.

26.04.2016 / London

Event

Enterprise Security & Risk Management 2016

Sytel Reply takes part in "Enterprise Security & Risk Management 2016"​, the UK’s leading event for the discussion of Information security, cyber security and risk management across every business sector, now in its fifth edition.

Digital Identity

Best Practice

Staying ahead of the digital identity evolution

Cyberspace represents the total interconnectedness of human beings through computers and telecommunications, regardless of physical geography. It is a term used to describe the whole range of information resources available through computer networks. For our purposes, cyberspace is a realm in which communication and interaction between two individuals, or between an individual and a computer, is facilitated by digital data exchanged over computer networks.​​

Staying ahead of the digital identity evolution 0

28.02.2016 / Cointelegraph

Press Article

How Bitcoin Disrupts Telecommunications?

The Blockchain has begun to disrupt not only the financial sector, but also the telecommunications sector. Using Reply’s expertise in the Blockchain technology and Software Defined Networking, Sytel Reply has created a brand new and powerful system, Securechain,​ to provide security, scalability and auditability to future networks.​

Software Defined Security

Best Practice

Advanced security mechanisms to protect assets and networks: Software-Defined Security

Organisations can now leverage the emerging technologies of Software Defined Networking (SDN) and Network Functions Virtualisation (NFV) for implementing security, as opposed to using traditional methods, and outlines some of the benefits that can be realised.​

17.11.2015 / Milan

Event

How to build a Threat Intelligence for your Company

Communication Valley Reply hosts the workshop "How to build a Threat Intelligence for your Company" on 17 November 2015 at the Reply Cyber Security Command Center.

13.10.2015

News & Communication

Reply's Cyber Security Command Center, a center specialised on managed security services

Communication Valley Reply, the Reply Group company that specialises in managed security services, has opened its new Cyber Security Command Center, an ISO27001-certified facility situated in Milan and for 24 hours x 365 days per year.

08.10.2015 / Milan

Event

FireEye Security Summit 2015

Spike Reply FireEye and Mandiant Platinum Partner, takes part in the 1st edition of FireEye Security Summit, an event dedicated to Business Security managers. Spike Reply shows how the mix of Technologies, Intelligence and Governance helps to fight Cyber Risks to which all enterprises are exposed.

DNS Security

Best Practice

Domain Name System Security Extensions

The aim of this white paper is to provide information with regards to the current status of Domain Name System (DNS) and its evolution into Domain Name System Security Extensions (DNSSEC).

Personal data protection

Best Practice

How Much Data are People Giving Away?

In today’s connected world, the amount of data available about an individual has increased exponentially. This white paper aims to outline the technologies being used to gather data about individuals, how this is being used and what the future could hold for data gathering.

Practice note

Best Practice

Security of Internet Payments: EBA issues new guidelines

This Briefing Note presents an overview on the regulatory impact of the European Banking Authority’s final Guidelines on the security of internet payments for Payment Services Providers and customers, highlighting areas which should be carefully checked and implemented before the 1 August 2015.

23.06.2014 / Security

News & Communication

Spike Reply penetration-test team wins second prize at the world Hacker’s Dome competition

The penetration-test team from Spike Reply has come second out of 124 entrants from 24 countries in the Hacker’s Dome competition.

25.02.2014

News & Communication

RSA appoints Communication Valley Reply as its first RSA Managed Security Program Services Provider in Europe

Communication Valley Reply today announced at the RSA Conference in San Francisco, that it has been appointed as the first Europe-based RSA Managed Security Program services provider by RSA, The Security Division of EMC.

IT Consumerization

Best Practice

Impacts of IT Consumerization on Business Security

​Over the last few years, consumer devices entered the workplace. IT discovered whole new challenges and opportunities but, today comes the second wave in Consumerization of IT, the Shadow IT.

Threat Intelligence Services

Best Practice

Underground Security Intelligence for Financial Institutions

Within Financial Sector, Online Banking and Spam Frauds have the most impact for the end user, generating a significant brand damage for the Financial Institution.​