Top 10 risks to include in an information security risk assessment

Top 10 risks to include in an information security risk assessment

An ISO 27001 risk assessment should have five key steps. In this blog, we look at the second step in the process: identifying the risks that organisations face. How to identify threats You ...

Guide to Cloud Network Security Basics

What is cloud network security? Cloud network security is comprised by the policies, controls, products, and procedures that protect a cloud infrastructure, its data, and its systems. How to gain flexibility, scalability, ...
ICS Risk

How the Past 6 Months Have Shaped ICS Risk

During the past year, there has been heightened awareness of the risks posed by industrial control system (ICS) vulnerabilities, with researchers and vendors focusing on identifying and remediating these vulnerabilities as effectively ...
Security Boulevard

Myth #4: Real-Time Visibility Is Impossible

This is part 4 of a 4-part series addressing compliance myths and what you need to know about uniting compliance and security in a hybrid environment. Read myth #3 here. The levels ...
security analysts

Pandemic Pushes Security Analysts to the Brink

Even when times are good, security analysts working in Security Operations Centers (SOCs) are up against it. They must stay on top of a rising tide of ever-changing threats, knowing all the ...
Security Boulevard
burnout

Pandemic Burnout: Yes, It’s a Thing. And It’s a Security Risk

Although not a medical diagnosis, job burnout is a real physical and emotional condition, causing such symptoms as extreme fatigue, lack of job satisfaction, apathy, anxiety, depression, decreased concentration and lowered productivity ...
Security Boulevard
Security Incident at VA Exposed 46K Veterans’ Information

Security Incident at VA Exposed 46K Veterans’ Information

The Office of Management at the U.S. Department of Veterans Affairs (VA) disclosed a security incident involving the personal data of 46,000 veterans. The VA detailed the data breach in a statement ...

Preventing Security Misconfigurations: Change Management and Compliance

It’s an enormous and unending daily challenge to make sure that changes to firewall policies are not just executed quickly and efficiently, but changes don’t decrease the security of your network. Changes ...
Risk terminology: Understanding assets, threats and vulnerabilities

Risk terminology: Understanding assets, threats and vulnerabilities

Whether you’re addressing cyber security on your own, following ISO 27001 or using the guidance outlined in the GDPR (General Data Protection Regulation), the process begins by assessing the risks you face ...

Top 5 Cybersecurity Risks with Cloud Migration

The demand for cloud computing has skyrocketed in recent years. Lower costs, a faster time to market, increased employee productivity, scalability, and flexibility are some of the beneficial factors motivating organizations to ...