An ethical hacker, a developer, a system engineer and an auditor walk into a bar…you think it‘s a joke, right? It is not the typical set of people having a…

Category
An ethical hacker, a developer, a system engineer and an auditor walk into a bar…you think it‘s a joke, right? It is not the typical set of people having a…
20-20 HINDSIGHT — FROM THE 1920s TO 2020 — WHAT CAN WE LEARN? In 1929, the vibrant U.S. economy went through the greatest shock it had ever received when the…
AI is slowly growing in its use and its maturity. So, should there be controls placed on its use, development, and future? As a young man, I spent a considerable…
The face of the healthcare industry is changing. With the advent of Internet of Things technologies (IoT), in-body and wearable medical devices are now capable of reporting patient statistics in…
In every aspect of life, the transferring of tasks and duties from humans to algorithms looks every day more inevitable. There is no reason to believe that risk management is…
Tips from a high-level government executive on ransomware protection. …
The 1-year anniversary of the GDPR has not really flooded the media the same way as it did at the launch. And I’m not sure what I should think about…
IoT promises to be an extraordinary revolution in our day-to-day life. But how will we respond to the new cybersecurity and privacy threats that this new technology poses? What standards…
ISO/IEC 27552 will be published in July 2019 as an extension ti ISO/IEC 27001 and ISO/IEC 27002. This standard is ISO's response to integrating Information Privacy Management Systems to existing…
Organizations now are acquiring paperless document management solutions to manage and control the operation of the management system. An automated ISO management system — an improved way of managing and…