Search for content, post, videos

Tag

information security

Marriott-cyber-attack-breach-security
0 COMMENT
124 Views
Marriott’s’ 500 Million Data Breach Scandal

A politically inclined attack or just a ‘simple’ lack of security awareness? Whatever the case, the cyber-attack that hit Marriott was huge. This was the joint second largest data breach to take place, after Yahoo in 2013 and Equifax in 2017. A cyber attacker stole personal information including names, emails,…

catch-wave-jobs-of-the-future
0 COMMENT
262 Views
Catch the Wave: What are the Jobs of the Future?

We are all talking about the future of jobs. But the question that we should perhaps ask, the most essential one, is: How should those jobs look like (or what should those jobs be)? With the evolution of the nature of the job market, we are facing new realities and…

dollars-office-mistake
0 COMMENT
1161 Views
More backup dollars than security dollars

Introduction Let us start with defining the following important terms; Backup, Information Security, and Information Assurance Backup In Information Technology, a backup is defined as a process of copying and archiving computer data that can be used to restore the original data after the occurrence of a data loss event…

Agile-Security-Information-group-work
0 COMMENT
1680 Views
Matching Information Security and Agile: Volume 2

Turning security assumptions around and have them work for you in agile. While agile development is going mainstream, information security is having difficulties to keep pace. The result of this struggle is that new systems are insecure, or that they are loaded with point solutions for security. What is so…

Irkam-Khan-Establishing-an-Effective-Information-Security-Policy
0 COMMENT
1243 Views
Establishing an Effective Information Security Policy

Securing critical business information has become increasingly important for growing organizations. Information Security Policies are effective tools to communicate management’s commitment and expectations from employees and stakeholders regarding security. The purpose of this article is to provide an overview of information security polices, including their objective, types, and development lifecycle.…

Harvey Berger-Picture1- State-Property-Breaches
0 COMMENT
929 Views
Legal Documents and State Property Protection

In 2016, data breaches remain one of the most significant challenges facing law firms and government agencies. Cybercriminals target law firms and government agencies due to the value of the intellectual property and sensitive information that they maintain. Since 2013, for the industries being tracked, approximately five (5) billion data…

_Arthur-Donkers-Agile-security-PECB-article-1.pdk
0 COMMENT
1800 Views
Matching Information Security and Agile: Volume 1

Four reasons why Traditional Information Security fails in Agile Environments While agile development is going mainstream, information security is having difficulties to keep pace with such short-term planning perspectives and instant changes in strategies. The result of this struggle is that new systems are insecure, or that they are loaded…

Standards-Insights-Conference-June-venue
0 COMMENT
1151 Views
Introducing the PECB Standards Insights Conference

Announcing with gratitude, The PECB Standards Insights Conference will be held in “Palais des congrès de Montréal” from June 29th to 30th, 2017. Attending this conference at the vibrant city of Montreal, Canada, will complement your professional opinions and reveal many future occurrences and disputable matters with respect to Management…