Trust Is a Necessity, Not a Luxury

Mapping Certificate and Key Security to Critical Security Controls I travel all over the world to meet with CIOs and CISOs and discuss their top-of-mind concerns. Our discussions inevitably return to the unrelenting barrage of trust-based attacks. Vulnerabilities like Heartbleed and successfully executed trust-based attacks have demonstrated just how devastating these attacks can be: if … Read moreTrust Is a Necessity, Not a Luxury

The SANS 20 Critical Security Controls

Mapping the SANS 20 to NIST 800-53 to ISO 27002 The SANS 20 Overview SANS has created the “20 Critical Security Controls” as a way of providing effective cyber defense against current and likely future Internet based attacks. Following these 20 controls will help establish, in their words, a “prioritized baseline of information security measures … Read moreThe SANS 20 Critical Security Controls

What are the SANS 20 Critical Security Controls

The 20 critical controls (I’ll call them the “Controls” from here on out) talk about four tenets: Offense informs defense: Use knowledge of actual attacks that have compromised systems to provide the foundation to build effective defenses. Metrics: Establish common metrics to provide a shared language for executives, IT specialists, auditors, and security officials to … Read moreWhat are the SANS 20 Critical Security Controls

Lack of Cyber Security

Governments and international business are only just waking up to the threats posed by a lack of cyber security. Sophisticated systems, interconnecting across international borders, are increasingly being targeted by cyber criminals, terrorist groups and foreign governments as a way of stealing data, blackmailing and virus attack. Business is failing to meet the challenge posed … Read moreLack of Cyber Security

The ‘Triple A’ Security Approach

Triple-A ratings are normally associated with chief financial officers keeping a tab on John Moody’s bond credit rating. In the world of IT however, how can a chief information officer or information technology decision maker (ITDM) rate the efficiency of an IT security implementation? IT security is one of the main concerns for ITDM’s with attacks … Read moreThe ‘Triple A’ Security Approach

The Internet of Things is dangerous!

Source: DDoS attacks are Dangerous (original in German) Brian Krebs is an IT security specialist journalist. On 20 September 2016 his WordPress blog was attacked with a DDoS attack. DDoS means “Distributed Denial of Service”, i.e. “distributed denial of service”. It conceals tons of pointless requests that a server flooding until it crashes. You can … Read moreThe Internet of Things is dangerous!

Innovations, Awareness and anticipating on Security threat’s

Recently I was writing my former blogs “Finance a Hacker” and “No 100% awareness of Cyber and Data Security within many companies worldwide” I want to go a little deeper in to these topics and hope to make people aware of the known risks. There are still companies, security architects who think that when you … Read moreInnovations, Awareness and anticipating on Security threat’s

Verified by MonsterInsights