We Set Up Compliance Policies! Now What?
There is an organization which has a solution to the next steps after you have some compliance set up: OCEG with their pdf “A Maturity Model For Integrated GRC” First…
New DDOS Attacks Changes Likelihood in Risk Assessments
The hacker must have a method in starting an attack like Dynamic Denial of Service (DDOS). in the last few days. the one which used hacked cameras and DVRs (Brian…
Hidden Hacks In Network
I’m often thinking where the next attack can come in and unfortunately it may come where we least expect it. Spiceworks blogpost has an interesting angle: How often have cloud…
Criminal Hackers Have Job Security
The Security Conversation has to change. Unknowing we(us humans in business and more) create a scenario which prevents us from being more secure Our Psyche seeks risk when confronted with…
Cyberjoke Friday v1.95
Yes it is a good day for CyberJoke Post today 10/7/16 where we try to make light of some IT life since it is too hard to make the heavy…
