Methods for Preserving Data Integrity include, Document Protection, Create an Auditable Chain of Custody and Generate Checksums
Browsing: CISO
As if 2013 was not exciting enough in the world of cyber security, 2014 will continue to keep us on our toes.
‘What 2 things are most likely to change the security industry in the next 2 years? And why?’
For security to be successful, it must be integrated. To be integrated, the value it offers must resonate on an individual basis while aligned with the needs of the organization.
In response to the news that the International Atomic Energy Agency (IAEA) systems have been infected with an unknown data-stealing malware, Tim Erlin, director of IT risk and security strategy, at Tripwire has made the following comments:
Following the news that London banks are to participate in cyber attack ‘war game’ Waking Shark II on 12 November, Barry Shteiman, senior security strategist at Imperva, has commented:
This discussion will highlight the importance of establishing organizational identity which is a key component for shared local, regional, national and international situational awareness.
Almost a third of CIOs in the UK are considering the role of COO or CEO as their next career step according to Deloitte’s first international CIO survey
A record number of brands were targeted by phishers in the second quarter of 2013, according to APWG. A total of 639 unique brands were targeted by phishing
ColdFusion induced breaches are definitely on the rise, which teaches us that hackers and security researchers are looking into this platform more and more as a green field for hacking endeavours.