Tag "Cyber Security Guidelines"

Back to homepage
Hardware/Network

With the growing infrastructure, there’s a huge demand for cybersecurity in India: Stephan Neumeier

With the growth of IoT and 5G, we will have more and more digital devices being connected to the internet in the future. However, most of those devices will not

Hardware/Network

Most Port Vulnerabilities Are Found in Three Ports

The vast majority of vulnerabilities in ports are found in just three, making it theoretically easier for organizations to defend them against attack, according to Alert Logic. The security vendor analyzed

Software

Cyber security of connected autonomous vehicles trialled

The privacy and security of data in CAVs has been improved thanks to WMG, University of Warwick who tested four innovations that were results of the PETRAS project. CAVs can

Industry Insights

New cyber security principles provide strategic guidance for government agencies

A significant revamp of a key cyber security document is designed to provide government agencies with strategic guidance on protecting their data. The Australian Cyber Security Centre (ACSC), which is

Industry Insights

CISO priorities: Implementing security from the get-go

Dr. David Brumley, CEO of ForAllSecure, a Carnegie Mellon computer science professor (on leave), and part of the team that won the DARPA Cyber Grand Challenge, was, at one time,

Expert Articles Software

SOAR vs. Security Operations: What’s Really Going On?

By John Czupak – CEO at ThreatQuotient, There’s something big brewing in the world of security operations, but what exactly is it? We are regularly inundated with various descriptions of

Industry Insights

Cybersecurity is a Team Sport

Identify a security framework that everyone on the team can work toward with a particular security control in mind, then measure success with this useful tool. Cybersecurity relies on specialists

Industry Insights

8 Actionable Tips a CISO Can use to Communicate to the Board or C-suite

For a long time, security was an additional duty assigned to the IT department. Today it’s a distinct discipline, a top business priority, and perhaps even a competitive edge. About

Cloud

Hyperfocused Security for the Cloud

The cloud is the future and the future has arrived. Gartner predicts the worldwide public cloud service market will grow from $182.4 billion in 2018 to $331.2 billion in 2022,

Expert Articles Network Security

How to establish insider threat programmes and conduct investigations

By Josh Lefkowitz – CEO at FlashPoint, Insider threat remains high on the list of issues keeping CISOs awake at night, and for good reason. Unlike external actors, insiders are