dsm 1997 2017


The prestigious peer-reviewed scholarly magazine on information systems security, administration and risk management

ISSN 1211-8737
ISSN 2336-6745 (online)

About magazine
What's DSM, editorial board, peer review policy.
Let's Start...

DSM Archive
See the back issues for DSM


My subscription
DSM subscriber section


The current issue

2016 3 PC
Main topic:

PUBLISHED: 24.3.2020

rr These articles were subject to peer-to-peer review.

Click on headline to see more about article

Interview with Jeffrey Bardin

Adam Lamser
Jeffrey Bardin is the executive director and chief intelligence officer at Treadstone 71. As a leading expert in both intelligence and cybersecurity, we asked him about cyber threat intelligence, what it means to be an intelligence officer in the private sector and captured his view of the progress cyber security made since its beginning.
DSM | page 7

Customers’ privacy in the environment of online advertisement on Czech web rr

Libor Polčák
Bid requests in Internet auctions for advertisement impressions propagate details about users, their attributes, browsers, location etc. Recently, several complaints have been lodged with several supervisory data protection authorities. This paper shows that special categories of personal data are processed in RTB initiated by Czech websites without seeking consent.
DSM | page 11

Data Retention obligation in case law of the Court of Justice of the European Union and Constitutional Court of the Czech Republic rr

Miroslav Uřičař
The obligation to retain traffic and location data (Data Retention) has been criticized due to its interference with the right to privacy since its adoption. The Data Retention obligation has already been subject to three decisions of the Court of Justice of the EU and three decisions of the Constitutional Court of the CR, the most important from them being the judgment of the Court of Justice declaring the Data Retention Directive invalid. In the pending case the Court of Justice has been requested by the French, Belgian and UK courts to assess whether their national Data Retention obligations are compliant with the EU law. Advocate General of the Court of Justice has presented his Opinion in these cases on 15 January 2020. In his opinion the means and methods of combating terrorism must be compatible with the requirements of the rule of law. Therefore, he states that the ePrivacy Directive precludes such legislation which imposes the obligation to retain, in a general and indiscriminate fashion, the traffic and location data of all subscribers, as is the case of the French, Belgian and UK legislation. The ruling of the Court of Justice could be expected in the coming months.
DSM | page 17

Analysis of the situation of digitalization rr

Peter Chrenko
Nowadays, the terms „digitalization“ and „digital transformation“ are either becoming a cliché or their interpretation differs from one person to another. It seems that the most common idea of what they mean is associated with implementing new technologies and applications in companies to make our and clients‘ life easier. The more money the company invests in them, the more „digital“ it is considered. The reality is, however, that these investments do not bring the desired effect, as we tend to get too caught up in this effort and forget about the most relevant – the client. The aim of this article is, using results of recent minisurveys, show what is the „digital reality“ in big companies. Secondly, it aims to suggest how to approach this issue with all its complexity and spread awareness within the public sphere, because it impacts not only the companies themselves but their clients and consequently the society as well. 
DSM | page 23

DevOps – part VII. rr

Vladimír Kufner
This, last but one article of the whole series about DevOps summarizes achieved outcomes of transformation to DevOps and reflects future possible trends in DevOps. It discusses most often myths ad typical problems when transforming to DevOps.
DSM | page 30

Two decades of United Nations‘ attempts for the cyberspace stabilizationrr

Richard Kadlčák
This article provides a historical overview of UN efforts to stabilize cyberspace dating back to the 1990s. The article also covers the current round of UN cyber-negotiations and identifies the main cleavages between states calling for the preservation of free, open, and secure cyberspace and those trying to restrict freedom online under the pretext of strengthening cybersecurity. In its concluding section, the article positions the Czech Republic in the context of UN cyber-negotiations and offers practical suggestions for a way forward with a view of stabilizing cyberspace at the global level.
DSM | page 36

Malware Emotet – Trickbot – Ryuk in the Benešov hospital rr

Adam Kučínský, Vojtěch Sikora
The article deals with the cyber attack on the hospital in Benešov, which took place in December 2019. The article describes the attack, the malware used in this case, the procedure after the detection of the attack and the measures to be applied to prevent and respond to these types of attacks.
DSM | page 39

Reality can be worse than the expectation rr

Martin Hlaváč
At the end of the year 2019, IT administrators of major financial institutions in the Czech Republic encountered unusual activities in the IT infrastructure of the company. During the verification process they concluded that the company had been hacked, and they tried to solve the problem on their own. But after several weeks of unsuccessful efforts, the AEC team was asked for help. Cyber security experts soon managed to uncover the unprecedented scale of the incident. They also detected the input vector into the system and then stopped the attack with precisely coordinated action. The final elimination of the attackers in the infrastructure of the institution was made possible by the deployment of the EPP/EDR solution and by subsequent manual termination of remaining hacker activities. During the investigation of the incident, the hackers were identified as members of the globally active group called Cobalt Group, which specializes in the illicit transfer of funds from companies and institutions.
DSM | page 44

Book review

Miroslav Uřičař

A review of the book Bezpečnost informačních systémů podle zákona o kybernetické bezpečnosti
(authors: Smejkal Vladimír, Sokol Tomáš, Kodl Jindřich).
DSM | page 50



About DSM - peer-reviewed magazine

DSM (Data Security Management) magazine was established in the second half of 1997 to create a professional-level periodical magazine, which would bring high quality and up-to date information on the status and development in the area of information security. It publishes theoretical works, the results of research activities and practical applications, reviews and consultations. Top experts participate in creation of DSM, which guarantees a high quality of the contents.

Editorial Policies...

dsm about en

Get a subscription

  • Pritned and Digital DSM Quarterly Magazine (Czech language ONLY)
  • Easy-to-download PDF format
  • Anytime, anywhere access for the subscribed content
  • Annual subscription or subscribe specific issues
  • Student discount - 15%
  • Bank transfer payment


Printed + digital subscription

4 issues

Digital subscription only

4 issues

See the back issues for DSM and all topics

  • DSM 2019/1 13-Dec-2018

    Main topic: Artificial intelligence, data centers,...

  • DSM 2017/4 09-Oct-2017

    Main topic: Endpoint device security (IoT)

  • DSM 2017/3 09-Oct-2017

    Main topic: Identity, identification, authentication

  • DSM 2017/2 28-Mar-2017

    Main topic: Intelligent Network and security

  • DSM 2017/1 28-Mar-2017

    Main topic: Malware, adware, spyware, ransomware, allware … virus protection (principles, technology,...

  • DSM 2016/4 08-Dec-2016

    Main Topic: Internet of Things

  • DSM 2016/3 27-Sep-2016

    Main topic: eIDAS

Contact us

TATE International s.r.o.
Hořejší nábřeží 21, 150 00 Praha 5

phone  Phone: +420 737 215 220
email  E-mail: This email address is being protected from spambots. You need JavaScript enabled to view it.

Back to top