Nigel LandmanISO/IEC 27001 Risk and removing silos.I read somewhere that the world of information security is a different vertical to that of cybersecurity. An interesting, but unhelpful…Nov 6
DennisGit detect dubious ownership in repositoryWhen working in the corporate environment, we usually have a designated user space for each authenticated user on our computer. For…Sep 28, 20227
Nigel LandmanISO/IEC 27001, it is a risky business.ISO/IEC 27001 [1] is a management system standard (MSS) [2] with information security as its focus. It is not a risk framework; it is not a…Nov 2Nov 2
Nishant GroverInformation Security Governance, Risk and Compliance teamNote: All views in this article are my personal and team structure differs upon organization size, infosec team size, and business…Jun 20, 20232Jun 20, 20232
Prince KhubaybMake sure your incident response plans in intact so you know how to face it when it occur.Jul 11Jul 11
Nigel LandmanISO/IEC 27001 Risk and removing silos.I read somewhere that the world of information security is a different vertical to that of cybersecurity. An interesting, but unhelpful…Nov 6
DennisGit detect dubious ownership in repositoryWhen working in the corporate environment, we usually have a designated user space for each authenticated user on our computer. For…Sep 28, 20227
Nigel LandmanISO/IEC 27001, it is a risky business.ISO/IEC 27001 [1] is a management system standard (MSS) [2] with information security as its focus. It is not a risk framework; it is not a…Nov 2
Nishant GroverInformation Security Governance, Risk and Compliance teamNote: All views in this article are my personal and team structure differs upon organization size, infosec team size, and business…Jun 20, 20232
Prince KhubaybMake sure your incident response plans in intact so you know how to face it when it occur.Jul 11
C0rs0Threat Modeling Methodology: The OCTAVE Method and its VariantsInformation security risk management is a critical aspect for companies in today’s digital landscape. With the growing threat of…Mar 11
Okan YıldızPrivacy by Design: Safeguarding Data from the StartPrivacy by Design: Safeguarding Data from the StartDec 9, 2023
Roman BurdiuzhaInformation Security: Certificates, Access Control, Authentication, and AuthorizationCertificates in Information SecurityNov 29, 2023