Almost every company is afraid of a major cyber-attack, yet most of them fail to properly manage vulnerabilities. Let's dive deeper into main causes behind open vulnerabilities and find a workaround
Information security is about leadership, procedures, people, risks, defense, assets and vulnerabilities
Here are suggestions for crafting simple, understandable and result oriented information security & risk assessment questionnaires.
There are many ways to manage risks and each one of them should fit business needs of organization. Here is one way to manage risks around assets.
Information security that is not based only on standards and checklists but also on risk-based prioritization, business needs, hands-on cyber security experience and a philosophy to always look at things from attacker’s perspective.
Create a Network Security Policy for your company. Overview of important aspects and tips on developing enforceable security policy
This post intends to provide information about the enforcement of cyber laws; it reviews laws and international treaties relating to cybercrime and provides a comparative analysis of legislations of several countries.
Meltdown and Spectre are two major vulnerabilities in modern processors, undermining layers of security features introduced by applications on your system, resulting in leakage of any data in clear form (encrypted/not encrypted).
Censorship, halal network, privacy intrusions and cyber army. A look into the Persian cyberspace.
While cryptocurrencies become popular, cyber criminals, authorities and media turn their attention to it. Here are the top threats to cryptocurrencies in 2018