risk
Top 10 risks to include in an information security risk assessment
An ISO 27001 risk assessment should have five key steps. In this blog, we look at the second step in the process: identifying the risks that organisations face. How to identify threats You ...
Guide to Cloud Network Security Basics
What is cloud network security? Cloud network security is comprised by the policies, controls, products, and procedures that protect a cloud infrastructure, its data, and its systems. How to gain flexibility, scalability, ...
How the Past 6 Months Have Shaped ICS Risk
During the past year, there has been heightened awareness of the risks posed by industrial control system (ICS) vulnerabilities, with researchers and vendors focusing on identifying and remediating these vulnerabilities as effectively ...
Myth #4: Real-Time Visibility Is Impossible
This is part 4 of a 4-part series addressing compliance myths and what you need to know about uniting compliance and security in a hybrid environment. Read myth #3 here. The levels ...
Pandemic Pushes Security Analysts to the Brink
Even when times are good, security analysts working in Security Operations Centers (SOCs) are up against it. They must stay on top of a rising tide of ever-changing threats, knowing all the ...
Pandemic Burnout: Yes, It’s a Thing. And It’s a Security Risk
Although not a medical diagnosis, job burnout is a real physical and emotional condition, causing such symptoms as extreme fatigue, lack of job satisfaction, apathy, anxiety, depression, decreased concentration and lowered productivity ...
Security Incident at VA Exposed 46K Veterans’ Information
The Office of Management at the U.S. Department of Veterans Affairs (VA) disclosed a security incident involving the personal data of 46,000 veterans. The VA detailed the data breach in a statement ...
Preventing Security Misconfigurations: Change Management and Compliance
It’s an enormous and unending daily challenge to make sure that changes to firewall policies are not just executed quickly and efficiently, but changes don’t decrease the security of your network. Changes ...
Risk terminology: Understanding assets, threats and vulnerabilities
Whether you’re addressing cyber security on your own, following ISO 27001 or using the guidance outlined in the GDPR (General Data Protection Regulation), the process begins by assessing the risks you face ...
Top 5 Cybersecurity Risks with Cloud Migration
The demand for cloud computing has skyrocketed in recent years. Lower costs, a faster time to market, increased employee productivity, scalability, and flexibility are some of the beneficial factors motivating organizations to ...

