Technology is changing so rapidly that today’s popular devices may become obsolete in only two years. Technology manufacturers introduce new devices every year that threaten to substitute existing ones instantly.…
![](https://insights.pecb.com/wp-content/uploads/2024/06/iStock-2015184399-1170x600.jpg)
Category
Technology is changing so rapidly that today’s popular devices may become obsolete in only two years. Technology manufacturers introduce new devices every year that threaten to substitute existing ones instantly.…
Phishing refers to one of the most widely-perpetrated forms of fraud, in which the attacker tries to get confidential and sensitive information, such as login credentials or account information, by…
Introduction Let us start with defining the following important terms; Backup, Information Security, and Information Assurance Backup In Information Technology, a backup is defined as a process of copying and…
Turning security assumptions around and have them work for you in agile. While agile development is going mainstream, information security is having difficulties to keep pace. The result of this…
Today’s digital frontier can be very much likened to the old days of the Wild West. In this present era identified by the ubiquitous nature of the Internet, cyber criminals…
The Rise of Bitcoin Bitcoin is a digital payment system, which was developed by an anonymous programmer or group of programmers who identify under the name of Satoshi Nakamoto. Even…
The increasing nature of cybercrime Application services in the cyberspace have gained a huge importance in our lives expanding beyond the business-to-consumers and consumer-to-consumer models to a form of many-to-many…
Four reasons why Traditional Information Security fails in Agile Environments While agile development is going mainstream, information security is having difficulties to keep pace with such short-term planning perspectives and…
By agreeing that Information Security is aligning among the most important factors in our everyday lives, we must take a step back to reconsidering our role in the widely connected…
Implementing ISO/IEC 27001 in your organization entails that you formally document the scope of your Information system which means that you want to know the exact information that you want…