Best Practices for the Protection of Information Assets, Part 3

| | Asset Security
Introduction In the previous two installments of this series, we examined information security management and the implementation and monitoring of security controls. Now, in this third and final part... Go on to the site to read the full article ... Read More

Best Practices for the Protection of Information Assets, Part 2

In Part 1 of this article series, we discussed Information Security Management, or ISM. This second installment will cover the implementation and monitoring of security controls, including logical... Go on to the site to read the full article ... Read More
Best Practices for the Protection of Information Assets, Part 1

Best Practices for the Protection of Information Assets, Part 1

Introduction This article series will discuss best practices for the protection of information assets, drawing from a wide array of sources. These articles are intended to be equally useful for a... Go on to the site to read the full article ... Read More
Best Practices for the Implementation of the Privacy by Design Concept in Smart Devices

Best Practices for the Implementation of the Privacy by Design Concept in Smart Devices

Introduction Both the terms ‘Internet of Things’ (IoT) and ‘Privacy by Design’ (PbD) were coined back in the 90s. The original idea behind PbD is to weave privacy into the... Go on to the site to read the full article ... Read More

Interview With an Expert: How Does a CISO Learn to Be a CISO?

| | Hacking
The role of the chief information security officer (CISO) is quickly becoming more important as cybersecurity in general becomes more intertwined with companies’ business activities. This fact... Go on to the site to read the full article ... Read More
A Brief Guide to GDPR Compliance

A Brief Guide to GDPR Compliance

Introduction: What do you know about the GDPR? The European Union (EU) has a new data protection law – the General Data Protection Regulation (henceforth “the GDPR” or “the... Go on to the site to read the full article ... Read More
Layer Seven DDoS Attacks

Layer Seven DDoS Attacks

What is Layer 7? The process of sending and receiving data from one host to another, data encapsulation, is possible due to the existence of a seven layer protocol suite presented as the OSI model... Go on to the site to read the full article ... Read More

How Criminals Can Exploit AI

Introduction Because tools for developing artificial intelligence (AI) sources and tutorials for its use are widely available in the public domain, it is expected that AIs for attacking purposes may... Go on to the site to read the full article ... Read More

Cooperation between Humans and Artificial Intelligence in the Name of Security

Artificial Intelligence (AI) – Machine Learning (ML) – Deep Learning (DL) Artificial intelligence as a term dates back to the 1950s, but only recently is coming into prominence because of... Go on to the site to read the full article ... Read More
Expert Tips on Incident Response Planning & Communication

Expert Tips on Incident Response Planning & Communication

An organization’s ability to recover quickly in the wake of a cyberattack is directly proportional to their incident response capabilities. In essence, incident response (IR) is a procedure... Go on to the site to read the full article ... Read More
Loading...