In day-to-day security operations, management is constantly juggling two very different forces. There are the structured ...
School cybersecurity audits don’t have to be stressful. If you know what to expect, you can be well prepared and set yourself up for future success. The effort put into the first audit will also pay ...
When most cybersecurity professionals hear the word "audit," they brace for friction. An audit is often viewed as a postmortem process — a control checklist that slows down innovation, questions every ...
Data breaches have become an all-consuming topic of late. Stories about data theft dominate political headlines, boardroom discussions and family meetings around the dinner table. They, of course, ...
Tony Christodoulou, Founder, CIO/CISO at Cyber Dexterity and Adjunct Faculty for GIBS Business School. (Image: Supplied) At a time when cyber threats are evolving in sophistication, approach and ...
In a bid to improve data center hardware and firmware security, the Open Compute Project announced the Security Appraisal Framework and Enablement (SAFE) program at OCP Summit event this week. The ...
The Delhi government is set to audit cybersecurity measures across its departments in alignment with central directives. The ...
Critical cyber security vulnerability assessmentsA thorough vulnerability assessment is invaluable for IT security teams, risk departments and the organisation as a whole. By Peter Chan, Cyber ...