PRIVACY AND DATA PROTECTION IN THE UAE

      Published on January 24, 2019     Authored by: Prof. Dr. Ir. Henk Jan Jansen The protection of personal data and privacy considerations are more important than ever due to globalisation and technological development. Although there are no explicit laws or authorities that deal specifically with privacy and data protection in the … Read morePRIVACY AND DATA PROTECTION IN THE UAE

No GDPR Compliancy yet, than read how to get compliant…

I was in attendance, and I got the chance to share an astonishing tale because very few people have heard it, even though it will already impact so many. No, it wasn’t predicting the next hurricane. It was nothing that dire, but for our industry – those selling cyber-security solutions – it was about something … Read moreNo GDPR Compliancy yet, than read how to get compliant…

No GDPR Compliancy yet, than read how to get compliant…

I was in attendance, and I got the chance to share an astonishing tale because very few people have heard it, even though it will already impact so many. No, it wasn’t predicting the next hurricane. It was nothing that dire, but for our industry – those selling cyber-security solutions – it was about something … Read moreNo GDPR Compliancy yet, than read how to get compliant…

Best way to reduce cost for your recruiting needs?

First of all, let me introduce myself first, I am Dr. Ir. Henk Jan Jansen, Head recruiting of Passport Business Engineering (RPO) Services. Who We Are: “Passport Business Engineering (RPO) Services” WE CAN CUT YOUR RECRUITING COSTS BY UPTO 70%! 100% DEDICATED to your needs Interested to know more? Do you want to know how … Read moreBest way to reduce cost for your recruiting needs?

Great confusion when you talk or think about the security of your infrastructure

Recently was reading a blog (German language) about Dekra Labor Market Report 2018 “More hacker attacks require more IT security personnel” And was really very surprised about the outcome and what the author was saying in this blog. I have read your blog meal but ask me now times very seriously from whether the dates … Read moreGreat confusion when you talk or think about the security of your infrastructure

So you want to be a security engineer?

Introduction Security engineering is different from traditional computer engineering: it requires a different mindset and viewpoint. I can spend hours going into the nuances of why and how, but instead I will point you to this eloquent essay by Parisa Tabriz. I strongly recommend reading it before continuing with the rest of this article. If you are … Read moreSo you want to be a security engineer?

How to Think Like an Attacker

Executive Summary Organizations are increasingly finding themselves in a situation where existing information security defense strategies and solutions are failing. Attackers are bypassing defenses by crafting highly targeted attacks and advanced malware to achieve their goals. This report discusses strategies for refocusing information security priorities and resources to protect the business’ valuable intellectual property. While … Read moreHow to Think Like an Attacker

Different Security Models

Security Models Introduction The essence of information security is to protect information. It is just that simple. So whenever possible do not make it more complicated than needed. Complexity for cyber security and privacy arise when information needs to be shared or must be made accessible by some digital device. The world where information was … Read moreDifferent Security Models

Verified by MonsterInsights