article thumbnail

GUEST ESSAY: As cyber risks rise in 2020, as they surely will, don’t overlook physical security

The Last Watchdog

Related: Good to know about IoT Physical security is often a second thought when it comes to information security. Despite this, physical security must be implemented correctly to prevent attackers from gaining physical access and taking whatever they desire. Access control is the restricting of access to a system.

article thumbnail

Episode 207: Sarah Tatsis of BlackBerry on finding and Keeping Women in Cyber

The Security Ledger

In this week’s episode of the podcast (#207) we speak with Sara Tatsis of the firm Blackberry about her 20 year career at the legendary mobile device maker and the myriad challenges attracting women to- and keeping them in the information security field. Read the whole entry. »

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Episode 207: Sara Tatsis of Blackberry on finding and Keeping Women in Cyber

The Security Ledger

In this week’s episode of the podcast (#207) we speak with Sara Tatsis of the firm Blackberry about her 20 year career at the legendary mobile device maker and the myriad challenges attracting women to- and keeping them in the information security field. Read the whole entry. »

article thumbnail

Understanding the Different Types of Audit Evidence

Centraleyes

Risk Assessments These audits identify and mitigate potential threats and vulnerabilities, ensuring organizations are well-prepared for cyber risks. Documentary Evidence: Tangible and straightforward, documentary evidence encompasses policies, procedures, and documentation related to information security controls.

Risk 52
article thumbnail

Million of vehicles can be attacked via MiCODUS MV720 GPS Trackers

Security Affairs

“These vulnerabilities could impact access to a vehicle fuel supply, vehicle control, or allow locational surveillance of vehicles in which the device is installed.” Successful exploitation of these vulnerabilities may allow a remote actor to exploit access and gain control the global positioning system tracker.”

article thumbnail

How to Combat Insider Threats

Security Affairs

Knowing that insider threats are a risk is one thing. Dealing with issues of insider cyber risk can be different and nuanced. However, over one-third of businesses are impacted by insider threats every year, and US businesses face about 2.500 internal security breaches in the aggregate per day.

article thumbnail

What Is a SaaS Security Checklist? Tips & Free Template

eSecurity Planet

Common compliance standards include GDPR, which governs data processing for EU members; PCI DSS, which guarantees safe credit card transactions; and NIST 800-53 for IT risk management. ISO 27000 is a standard for information security and SOC is for maintaining consumer data integrity and security across several dimensions.

Risk 105