We Set Up Compliance Policies! Now What?
There is an organization which has a solution to the next steps after you have some compliance set up: OCEG with their pdf “A Maturity Model For Integrated GRC” First…
Defend Your Systems
There is an organization which has a solution to the next steps after you have some compliance set up: OCEG with their pdf “A Maturity Model For Integrated GRC” First…
I’m often thinking where the next attack can come in and unfortunately it may come where we least expect it. Spiceworks blogpost has an interesting angle: How often have cloud…
Just for fun I wanted to make the headline to be “Make Software Secure Again” But when was software secure? Never, as we assumed it was secure but actually SW…
Compliance standards have similar goals (PCI – HIPAA – SOX – e-discovery) and the question is what should your password policy be to fulfill compliance and your own security risk…
Did you want to set up your own Intrusion Analysis department? Or at least give a framework for creating a method to understand a breach. Then read this document at…