Governance, Risk and Compliance

Governance, Risk and Compliance

Recovery — A Critical Aspect of Data Protection

Recovery — A Critical Aspect of Data Protection

| | G Suite
Data protection has two facets — one focused on protecting data with encryption, firewalls, employee trainings, regular audits — and the other focused on recovering data quickly and easily, with minimal negative ...

Why You Need a Concrete Incident Response Plan (Not Strategy)

Recently, I had the privilege to be part of a four-person discussion panel at a security event in London where the topic was about incident response. The panel was hosted by another ...
vsRisk Cloud - ISO 27001 risk assessments made simple

Understanding the 7 different types of data breaches

Every day more than 6 million data records are compromised, with no organisation or sector immune. Organisations are facing a data breach war so it’s imperative that ‘know your enemy’ becomes part ...

Achieve Security Through Compliance in the Cloud

| | CIS, Cloud, Compliance
Digging through my cupboards recently, I came across my old collection of 3½ floppy disks. It’s been quite some time since I’ve had a need to plug in my trusty USB floppy ...
The Quora Data Breach, Facebook's Private Emails, Google Location Tracking - WB46

The Quora Data Breach, Facebook’s Private Emails, Google Location Tracking – WB46

https://youtu.be/0O3rruiS6Z0 This is your Shared Security Weekly Blaze for December 10th 2018 with your host, Tom Eston. In this week’s episode: In this week’s episode: the Quora data breach, Facebook’s private emails, ...
Preparing for New FERC Security Standards

5 Challenges Utilities Will Face in Preparing for New FERC Security Standards

Since the attack on the power grid in Ukraine, defending critical infrastructure against the threat of cyberattack has become a top priority. In an effort to strengthen supply chain risk management within ...
Security Boulevard
Business Continuity and Disaster Recovery

Business Continuity and Disaster Recovery: Your Organization’s Safety Plan

From hurricanes, errant employees, malware to even a rodent with an appetite for cables — the likelihood of an organization suffering data loss has never been greater. An organization's best defense is ...
Barracuda Networks ATO Attacks

Business Email Compromise Gang Targeted 50,000 Company Executives

A Nigerian gang with members based in the U.K. is perpetrating a business email compromise operation aimed squarely at executives at companies with locations worldwide. The gang has compiled a target list ...
Security Boulevard
Government Messaging Solutions for the 21st Century: Think Beyond Encryption

Government Messaging Solutions for the 21st Century: Think Beyond Encryption

The DNC email leak in 2016 revealed just how insecure email communications can be. It should be no surprise that government officials have been turning to other, more secure mediums, to communicate ...
Blockchain Security: 3 Ways to Secure Your Blockchain

Blockchain Security: 3 Ways to Secure Your Blockchain

From just another buzzword a few years back, to one of the most pursued technologies across the globe, Blockchain has come a long way. Improved data security, faster transactions and cost savings ...
Loading...