CTO of Center for Internet Security Expounds on Transforming InfoSec
SecureWorld News
NOVEMBER 9, 2022
Can you do more in that space? Or is that just too much of a reach?
SecureWorld News
NOVEMBER 9, 2022
Can you do more in that space? Or is that just too much of a reach?
Notice Bored
MARCH 10, 2021
Siegel and Mark Sweeney Publisher: Auerbach/CRC Press ISBN: 978-0-367-45817-1 Price: ~ US$100 + shipping from Amazon Outline This book lays out a systematic process for developing corporate strategy in the area of cyber (meaning IT) security and resilience. The book makes it a little easier. This stuff is hard.
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Security Boulevard
AUGUST 1, 2023
Recon Infosec is a growing managed security services provider run by a team of seasoned cybersecurity experts. All-star security team seeks a better solution Recon Infosec is not your average managed detection and response (MDR) provider. But for Recon Infosec, finding an alternative to its existing security stack was challenging.
SecureWorld News
JUNE 24, 2024
T – Technology Essential to secure the digital enterprise across the Infrastructure, Application and Services dimensions of a layered security architecture. Building a strong incident response plan with play books and calibrating regularly via tabletop exercises with cross functional stakeholders is paramount.
Notice Bored
APRIL 20, 2022
I have in mind consultancy, advisory and other specialist services such as: Building and construction services e.g. architecture, surveying; B usiness services e.g. marketing and sales, strategy and management consulting, auditing, quality consulting; E ngineering services e.g. electrical and electronic design, materials science, measurement and calibration; (..)
The Falcon's View
AUGUST 6, 2018
However, listing out specific technologies can become cumbersome, plus it doesn't necessarily lend itself well to thinking about security architecture and strategy. Behavioral InfoSec. Applications. - Instead, be aware that your basics come first (out of necessity), then comes some form of risk mgmt.,
ForAllSecure
FEBRUARY 2, 2022
Vamosi: For this episode I also want to weigh in on a very controversial topic within infosec today. Now, if you’ve been around infosec for any length of time, you are probably thinking about Diffie-Hellman, RSA, Elliptical Curve, even SHA. Vamosi: There’s this saying in infosec about never rolling your own encryption.
Let's personalize your content