Search for content, post, videos

Tag

information security

dollars-office-mistake
0 COMMENT
1004 Views
More backup dollars than security dollars

Introduction Let us start with defining the following important terms; Backup, Information Security, and Information Assurance Backup In Information Technology, a backup is defined as a process of copying and archiving computer data that can be used to restore the original data after the occurrence of a data loss event…

Agile-Security-Information-group-work
0 COMMENT
1334 Views
Matching Information Security and Agile: Volume 2

Turning security assumptions around and have them work for you in agile.   While agile development is going mainstream, information security is having difficulties to keep pace. The result of this struggle is that new systems are insecure, or that they are loaded with point solutions for security. What is…

Irkam-Khan-Establishing-an-Effective-Information-Security-Policy
0 COMMENT
1072 Views
Establishing an Effective Information Security Policy

Securing critical business information has become increasingly important for growing organizations. Information Security Policies are effective tools to communicate management’s commitment and expectations from employees and stakeholders regarding security. The purpose of this article is to provide an overview of information security polices, including their objective, types, and development lifecycle.…

Harvey Berger-Picture1- State-Property-Breaches
0 COMMENT
773 Views
Legal Documents and State Property Protection

In 2016, data breaches remain one of the most significant challenges facing law firms and government agencies. Cybercriminals target law firms and government agencies due to the value of the intellectual property and sensitive information that they maintain. Since 2013, for the industries being tracked, approximately five (5) billion data…

_Arthur-Donkers-Agile-security-PECB-article-1.pdk
0 COMMENT
1636 Views
Matching Information Security and Agile: Volume 1

Four reasons why Traditional Information Security fails in Agile Environments While agile development is going mainstream, information security is having difficulties to keep pace with such short-term planning perspectives and instant changes in strategies. The result of this struggle is that new systems are insecure, or that they are loaded…

Standards-Insights-Conference-June-venue
0 COMMENT
898 Views
Introducing the PECB Standards Insights Conference

Announcing with gratitude, The PECB Standards Insights Conference will be held in “Palais des congrès de Montréal” from June 29th to 30th, 2017. Attending this conference at the vibrant city of Montreal, Canada, will complement your professional opinions and reveal many future occurrences and disputable matters with respect to Management…

protecting-organization-against-ransomware
0 COMMENT
495 Views
Protecting Against Ransomware with ISO/IEC 27001

Implementing ISO/IEC 27001 in your organization entails that you formally document the scope of your Information system which means that you want to know the exact information that you want to protect and will be prepared to protect it. This way, you are keeping safe your organization’s information’s system by…

0 COMMENT
739 Views
Information Security in Banks and Financial Institutions

The importance of information security in our lives is widely understood by now. Investments of organizations into information security keep growing, but also do cybercrime risks and costs of data breaches. By their very nature, financial institutions are an attractive target for attackers. Also, the data breach costs per capita…