Examining the How of NIST Privacy

Posted by:

Last time I discussed why you should consider using the NIST Privacy framework as both a foundation and methodology for managing data protection and privacy risk management

In this article, I’d like to explain how it works in practice.

Here we bring together facts and information from disparate and sometimes rather technical documents. When I began my research into the NIST Privacy framework, I saw it described as both “

Read More →
0

NIST Privacy Framework – Your Foundation for Future Privacy Compliance

Posted by:

In preparing to write an article about the NIST Privacy Framework I asked some friends who work in infosec and data protection for their thoughts. With few exceptions the conversation went:

“Oh, you mean the NIST CyberSecurity Framework.”

“No, the Privacy Framework”, I’d reply.

“I’m pretty sure it’s Cybersecurity.”

“I’ll send you a link.”

It’s not surprising that it’s gone under the ...

Read More →
0

Ransomware Going Nowhere – Healthcare Beware!

Posted by:

My friends who are lucky enough to still be employed throughout the pandemic appear to be split into two camps. Half seem to be spending much of the day staring out of the window, largely unproductive, the bosses’ gaze concentrating on other areas like the distracted Eye of Sauron. The other half are working three times as hard to make up for the colleagues who are furloughed or are unlucky enough to have been cut.

One set ...

Read More →
0

The ins and outs of single sign on

Posted by:

With many technology and security events, such as Infosecurity Europe 2019, being in full swing, a number of tech goliaths are making some pretty bold statements.

It seems that the tectonic plates making up the technology landscape are indeed shifting, but it is anyone’s speculation to envision the end result…yet.

The biggest one by far this week was Apple announcing its plans to develop an Apple ID as an authenticator for online products and services.

So many of us ...

Read More →
0

CCPA vs GDPR – what you need to know

Posted by:

Most of us are aware that California’s new consumer privacy law- CCPA – is set to take effect next January. While that might seem like eons away, it is not.

You might be forgiven for thinking that because you have twisted and strengthened your operation to comply with the EU’s General Data Protection Act, GDPR for short, you surely must be meeting the California privacy requirements.

Sadly – you are wrong. It’s ...

Read More →
0

2019: What to expect in cybersecurity this year

Posted by:

Another year is upon us. 2018 was a cyber rollercoaster with massive internet scandals and data breaches.  With that in mind there are a number of IT security topics that should be top of mind for 2019.

Take a look at a few we’ve identified…

Security by Design

We expect to see a greater focus on baked-in security, be this in application development, or in IT and company strategies. In 2018, with the enforcement of Europe’s data ...

Read More →
0

Yes, the passwords users choose *really* matters

Posted by:

Earlier this month, we celebrated that little-known tribute day known as World Password Day.

Responsible security organizations should use this opportunity to share best practice advice to help people understand just how darn easy it is for fraudsters to cause havoc if they can access privileged accounts authorized to change, edit and delete files, settings, apps or data.

Sadly, it seems that it is also a day where marketing people, who might be less au fait with cybersecurity, ...

Read More →
0

Before you buy or connect a smart device (IoT), read this!

Posted by:

The Internet of Things (IoT), as a term, has been bandied around a lot over the last few years.

Many people – even those that work in the technology sector – are still unclear on what IoT really means.

In this blog series, we will define IoT, talk about why infosecurity experts are concerned, and delve into some of the issues facing both providers and consumers.

We’ll also provide some practical recommendations for both parties:

  • Consumers of IoT devices: Tips for choosing the right IoT ...
Read More →
1

Trump’s budget blueprint: what’s it mean for cybersecurity?

Posted by:

Last week, we saw the release of the US’s 2018 budget blueprint.

Before I even read the document, I did a random search on some security-related keywords within the 2018 budget to see how many times each one showed up. I found the results rather revealing. Make of this what you will:

  • Cyber: 15
  • Security: 68 (5 of which refer to Homeland Security)
  • Attack: 4
  • Privacy: ...
Read More →
0

Want to be a cybersecurity hero this holiday? Here’s how.

Posted by:

Ahhh December 2016. It is that time of year again. Christmas and other holiday celebrations are just days and weeks away.

However you celebrate, whether you are planning the festive feast, travelling to a far-flung location, or madly getting your gifts ready, you’re likely to be with others: your family, your pals, your in-laws, your friends or work associates.

So we have a proposal for all you IT security-savvy types out there…Join TBG Security’s

IT Security Holiday Lock Down

Here is our ...

Read More →
0
Page 1 of 2 12
})
SEC Cybersecurity Exams