Meet CIS RAM: the new balanced infosecurity framework

Posted by:

Applications, devices, technology and service provisioning are the bread and butter of IT, but any information security professional knows that risk management is equally important.

There is no point in an IT advisor implementing a service if it poses too much risk to the organization. This is why, for example, many companies prevent  access to social media sites – the benefits of access does not outweigh the risk.

Information Security professionals  have a duty ...

Read More →
0

What is an information security framework and why do I need one?

Posted by:

An information security framework, when done properly, will allow any security leader to more intelligently manage their organizations cyber risk.

The framework consists of a number of documents that clearly define the adopted policies, procedures, and processes by which your organisation abides.  It effectively explains to all parties (internal, tangential and external) how information, systems and services are managed within your organisation.

The main point of having an information security framework in place is ...

Read More →
0

Blockchain: Can it secure the Internet?

Posted by:

The recent Bitcoin bubble thrust the concept of cryptocurrencies firmly into the public consciousness. But attention quickly shifted away from Bitcoin itself – just one of a huge range of crypto-powered digital currencies, after all – and onto the technology that underpins it: the blockchain.

Blockchain has been the focus of huge amounts of research and development for at least a few years now, but it’s only really in the last six months or so that ...

Read More →
0

Convincing executive stakeholders that even the tiniest cyber-incident can lead to big disasters.

Posted by:

We published an article recently about how many senior information security professionals, be they CISOs or CIOs, are worried about their systems being vulnerable to breach. One of the main problems is getting senior stakeholders, like the Board or the executive management team, to buy into your information security strategy. We shared a few approaches on how to address this ubiquitous problem.

Achieving executive buy-in on information security policies is much more difficult than ...

Read More →
0

Cybersecurity budget: CISO advice for getting your Board of Directors to take notice

Posted by:

There are many CISOs and CSOs out there hiding their proverbial sweaty palms.

They’re stressed out, worried that it is just a matter of time before their network gets caught up in some embarrassing data debacle – perhaps it will be ransomware, or a targeted attack or an insider leak.

And they know they will then truly be in the hot seat.

Thing is, for many, it is a fingers-crossed game, because ...

Read More →
1

Cybersecurity predictions 2018: 5 key infosecurity trends to watch out for

Posted by:

In our last post, we talked about the most significant data breaches of 2017.  And what better way to wrap up 2017 than by pulling out our crystal ball and gazing into the near future.

Using our expertise in infosecurity, here is our shortlist of what to watch out for in the upcoming year:

Expect new EU regulation GDPR to make headlines.

The way in which your website collates ...

Read More →
0

Takeaways from 2017’s worst cyber hacks, data leaks and breaches

Posted by:

2017 may be remembered as the year where people and organizations were hammered by mega breaches. We estimate that more US residents lost private or sensitive data this year than ever before.

This is largely thanks to massive cyber events which were either designed to steal data, hold a company for ransom, or embarrass organizations by publicizing private data, such as customer details to unreleased television series. Sometimes, however, it’s just do to simple human error. ...

Read More →
0

What to do with the last of your 2017 cyber security budget?

Posted by:

Late in the financial year, it can difficult to figure out the best way to spend what’s left over in the information security budget.

No one wants to leave money on the table, especially when it could significantly reduce your exposure to cyber risk. The problem is that for any experienced IT security lead, you know there are thousands of ways that money could be spent: training, new security software, hardware upgrades, policy or system reviews, etc

Any of ...

Read More →
0

Getting ahead of a new breed of Ransomware

Posted by:

We typically understand a ransomware attack to be a demand for payment in return for decrypting files. But evolution, even in malware, is inevitable. A fairly new disruptive cyber cell known as The Dark Overlord is relying on the threat of reputation damage to “encourage” its victims to pay up.

You might be thinking that reputation damage wouldn’t be enough to make your firm shake in its boots, but you’d be wrong. These Dark Overlord cyberbullies use nasty tactics ...

Read More →
0

IoT Developers: checklist for building more secure Smart Devices.

Posted by:

[This is Part 2. Part 1 of this blog series is here: Before you buy or connect a smart device (IoT)…]

Having worked for more than 20 years in the technology and information security industry, I have seen first hand how hard management can push their teams.

There is no doubt that the IoT race is on, but whipping teams into a frenzy so that they race through the development, testing and production phases has a real ...

Read More →
0
Page 1 of 7 12345...»
})
SEC Cybersecurity Exams