ISO/IEC 27035-1:2023— Information Security Management
A single cyber attack, such as data breach, malware, ransomware or DDoS attack, cost companies in the U.S. a median of $18,000 in 2022. That…
A single cyber attack, such as data breach, malware, ransomware or DDoS attack, cost companies in the U.S. a median of $18,000 in 2022. That…
People often say that the world is changing, and technology is painted as the catalyst for this rapid progression. In truth, the world has always…
In 1991, the World Wide Web went live. In the thirty years since, the world has forever changed — right down to the legal landscape. …
In June of 2018, the California Consumer Privacy Act (CCPA) was signed into law. The landmark privacy legislation passed on the heels of the European…
Like a shadow of pixels, your digital presence is an extension of you. Unfortunately in the first six months of 2019 alone, there were over…
An ISO technical specification, ISO/IEC TS 27008:2019 – Information Technology – Security Techniques – Guidelines For The Assessment Of Information Security Controls, has been released….
The Internet has advanced the global economy immensely, and the emergence of various web-connected devices or “things” accelerates the delivery of technology’s many benefits for…
Vulnerabilities are undesirable in all facets of life. In fact, the word “vulnerable” derives from the Latin vulnus, meaning “wound.” For information technology and cybersecurity…
Salt and pepper, Batman and Robin, and verification and validation (V&V) have more in common than one might think. For instance, all three of these…