article thumbnail

Business Must Change: InfoSec in 2019

The Falcon's View

Consider, if you will, that fundamentally we in infosec want people to make better decisions. No matter how you look at it, DevOps is the way that business should operate, and that is - interestingly enough - exactly matched to the org management model that Laloux describes (without ever getting into technology or DevOps!).

InfoSec 40
article thumbnail

Announcing the public availability of the Cisco Cloud Controls Framework (CCF)

Cisco Security

ISO IEC 27001:2013 – Information technology — Security techniques — Information security management systems — Requirements. ISO/IEC 27017:2015 – Information technology — Security techniques — Code of practice for information security controls based on ISO/IEC 27002 for cloud services.

Marketing 113
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

New Leak Shows Business Side of China’s APT Menace

Krebs on Security

A large cache of more than 500 documents published to GitHub last week indicate the records come from i-SOON , a technology company headquartered in Shanghai that is perhaps best known for providing cybersecurity training courses throughout China. A marketing slide deck promoting i-SOON’s Advanced Persistent Threat (APT) capabilities.

article thumbnail

Top Cybersecurity Accounts to Follow on Twitter

eSecurity Planet

Brian Krebs is an independent investigative reporter known for his coverage of technology, malware , data breaches , and cybercrime developments. Longtime network and system administrator Jack Daniel is a technology community activist, mentor, and storyteller. Markstedter actively contributes to filling the infosec education gap.

article thumbnail

From a tech explosion to accidental cyberattacks, researchers offer a glimpse into 2030

SC Magazine

5G is among the technologies that researchers predict will have a big impact on the security landscape in the next decade. The project is based on work Baines did for Europol’s Cyber Crimes Center, Project 2020, which made a similar series of predictions in 2013 targeting last year. Photo by Mario Tama/Getty Images).

article thumbnail

ISO/IEC 27002 update

Notice Bored

Aside from restructuring and generally updating the controls from the 2013 second edition, the committee (finally!) To supplement the extensive suite we already offer, we are currently finalising topic-specific policy templates on threat intelligence and data masking (details to follow). hopefully.

IoT 102
article thumbnail

Happy 10th anniversary & Kali's story.so far

Kali Linux

Wednesday 13th, March 2013, 10 years ago, Kali Linux v1.0 A fresh start in March 2013. BackTrack Linux became Kali Linux in March 2013. Moto) first saw the light of day at Black Hat Europe 2013 and was based on Debian 7. In information security (infosec) there is the need to be on the latest version.

InfoSec 52