Remove Architecture Remove Book Remove InfoSec
article thumbnail

CTO of Center for Internet Security Expounds on Transforming InfoSec

SecureWorld News

Can you do more in that space? Or is that just too much of a reach?

InfoSec 97
article thumbnail

NBlog Mar 11 - book review on "Cyber Strategy"

Notice Bored

Siegel and Mark Sweeney Publisher: Auerbach/CRC Press ISBN: 978-0-367-45817-1 Price: ~ US$100 + shipping from Amazon Outline This book lays out a systematic process for developing corporate strategy in the area of cyber (meaning IT) security and resilience. The book makes it a little easier. This stuff is hard.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

MDR firm saves $100K per year with LimaCharlie

Security Boulevard

Recon Infosec is a growing managed security services provider run by a team of seasoned cybersecurity experts. All-star security team seeks a better solution Recon Infosec is not your average managed detection and response (MDR) provider. But for Recon Infosec, finding an alternative to its existing security stack was challenging.

InfoSec 97
article thumbnail

The Rise of Data Sovereignty and a Privacy Era

SecureWorld News

T – Technology Essential to secure the digital enterprise across the Infrastructure, Application and Services dimensions of a layered security architecture. Building a strong incident response plan with play books and calibrating regularly via tabletop exercises with cross functional stakeholders is paramount.

IoT 108
article thumbnail

Information risk and security for professional services

Notice Bored

I have in mind consultancy, advisory and other specialist services such as: Building and construction services e.g. architecture, surveying; B usiness services e.g. marketing and sales, strategy and management consulting, auditing, quality consulting; E ngineering services e.g. electrical and electronic design, materials science, measurement and calibration; (..)

Risk 72
article thumbnail

The Quest for Optimal Security

The Falcon's View

However, listing out specific technologies can become cumbersome, plus it doesn't necessarily lend itself well to thinking about security architecture and strategy. Behavioral InfoSec. Applications. - Instead, be aware that your basics come first (out of necessity), then comes some form of risk mgmt.,

InfoSec 40
article thumbnail

The Hacker Mind Podcast: Fuzzing Crypto

ForAllSecure

Vamosi: For this episode I also want to weigh in on a very controversial topic within infosec today. Now, if you’ve been around infosec for any length of time, you are probably thinking about Diffie-Hellman, RSA, Elliptical Curve, even SHA. Vamosi: There’s this saying in infosec about never rolling your own encryption.