Russian activists seized the IDs of 54m Turkish citizens, raising already heightened concerns about Ankara’s ability to protect the public’s private data.
Browsing: CISO
The NIST consider how different sectors have to negotiate variable implementation mechanisms in order to adopt the new cybersecurity standards.
Interested in business continuity? Here’s a new book that might attract your attention: Becoming Resilient: The Definitive Guide to ISO 22301 Implementation
In fact, a recent survey showed that IT professionals are among the worst offenders of shadow IT.
From our overall economy to an individuals social activities, we are heavily reliant on the Internet, cloud computing and data centres.
The World Federation of Exchanges has announced the creation of a cyber security committee for the purposes of defending global capital exchange markets.
Journalists are deploying SecureDrop en mass, from Forbes, New Yorker to Wired. As a result we will begin to see more and broader leaks worldwide.
Latest Hacker Intelligence Initiative Report Finds Cyber Criminals Adopting Database as a Service for Infection and Data Exfiltration
A few weeks ago, Dell proudly introduced our CONNECTED SECURITY vision and strategy to the world.
With over 19,500 certificates issued worldwide, and a year-on-year growth, ISO 27001 is the most widely adopted information security best practice framework