ARE PEOPLE REALLY THE WEAKEST LINK IN THE INFORMATION SECURITY CHAIN? This question sounds familiar, right? Indeed, information security is often considered as a chain, and everyone knows that a chain is only as strong as its weakest link is. Starting from this metaphor, it seems like a good idea…
Tag
INFORMATION SECURITY
AI is slowly growing in its use and its maturity. So, should there be controls placed on its use, development, and future? As a young man, I spent a considerable amount of time reading, and my favorite reading pastimes were science fiction and science. I enjoyed science fiction authors, such…
The face of the healthcare industry is changing. With the advent of Internet of Things technologies (IoT), in-body and wearable medical devices are now capable of reporting patient statistics in real time, administering medicine, autonomously delivering corrective stimulus and more. Patients receive alerts on their smartphones when their glucose levels…
It is incorrect to presume that only large organizations need to manage risk. The size of the organization is not a factor when it comes to dealing with risk; all organizations are responsible for ensuring the availability, integrity, and confidentiality of the assets entrusted to them by their clients. Therefore,…
ISO/IEC 27552 will be published in July 2019 as an extension ti ISO/IEC 27001 and ISO/IEC 27002. This standard is ISO's response to integrating Information Privacy Management Systems to existing Information Security Management Systems based on ISO/IEC 27001 in order to insure compliance with data privacy regimes such as the…
The Story of Daniel Seid, a PECB Certified ISO/IEC 27001 Master Looking back over the last decade, it’s remarkable how much PECB’s network has achieved and advanced professionally. Such advancement is not only a result of our training development and deliverables, but also of the ways by which we’ve been…
In late April this year, Facebook announced that it has set aside $3 to $5 billion to negotiate a settlement agreement with the US Federal Trade Commission over a complaint of mishandled users’ personal data, which emerged in light of to the Cambridge Analytica scandal in March 2018. The company’s…
Estonia is known as a pioneer in building e-country solutions. Some examples are e-government solutions, e-identity, e-voting, etc. My intention is to add to this list cybersecurity-related solutions, based on the fact that Estonia holds the number one position on the National Cyber Security Index (NCSI) ranking. I am not…
A politically inclined attack or just a ‘simple’ lack of security awareness? Whatever the case, the cyber-attack that hit Marriott was huge. This was the joint second largest data breach to take place, after Yahoo in 2013 and Equifax in 2017. A cyber attacker stole personal information including names, emails,…
We are all talking about the future of jobs. But the question that we should perhaps ask, the most essential one, is: How should those jobs look like (or what should those jobs be)? With the evolution of the nature of the job market, we are facing new realities and…