IoT device makers wanting to better security standards

Posted by:

The Internet of Things is moving ever closer to an Internet of Everything, with more devices and dinguses connected to, and controlled via, our worldwide network of networks. 

The last decade or so has seen an explosion of new ways to monitor, track and operate a growing range of tools and appliances, but as this marketplace bloomed, security issues were all too often an afterthought. 

Companies with long expertise in building everything from lightbulbs and fridges ...

Read More →
0

Making Vendor Risk Management Part of Your Security Strategy

Posted by:

When we think of Vendor Risk Management (VRM), there’s usually a policy or a procedure, possibly even a process to follow – and for good reason. The consistent approach that effective VRM gives you should lead to lower financial and strategic risks, increased admin efficiencies, reduced costs and quicker onboarding of suppliers.

A painful lessons this year has taught businesses is that they are only as resilient as the vendors they rely on. A promise is only ...

Read More →
0

Examining the How of NIST Privacy

Posted by:

Last time I discussed why you should consider using the NIST Privacy framework as both a foundation and methodology for managing data protection and privacy risk management

In this article, I’d like to explain how it works in practice.

Here we bring together facts and information from disparate and sometimes rather technical documents. When I began my research into the NIST Privacy framework, I saw it described as both “

Read More →
0
})
SEC Cybersecurity Exams