With over 19,500 certificates issued worldwide, and a year-on-year growth, ISO 27001 is the most widely adopted information security best practice framework
Browsing: Strategy and Planning
Methods for Preserving Data Integrity include, Document Protection, Create an Auditable Chain of Custody and Generate Checksums
If you’re looking to attack someone who’s not very computer savvy, then phishing is the easiest way to go about it.
Retailers that use technology to try to save shoppers time and money without asking permission first may actually do more harm than help to their bottom line this holiday season.
As if 2013 was not exciting enough in the world of cyber security, 2014 will continue to keep us on our toes.
Who will get swept away and who will discover new lands? Here’s what’s happening in IAM these days and why federating the identity layer
For security to be successful, it must be integrated. To be integrated, the value it offers must resonate on an individual basis while aligned with the needs of the organization.
The Cloud Security Alliance (CSA) announced that Bob Flores, former CTO of the Central Intelligence Agency (CIA), has been added to the program as a keynote speaker for CSA Congress 2013.
The Cloud Security Alliance, a not-for-profit organization which promotes the use of best practices for providing security assurance within cloud computing,
In response to the news that the International Atomic Energy Agency (IAEA) systems have been infected with an unknown data-stealing malware, Tim Erlin, director of IT risk and security strategy, at Tripwire has made the following comments: