IT Security Vulnerability vs Threat vs Risk: What are the Differences?

In today’s world, data and protecting that data are critical considerations for businesses. Customers want to ensure that their information is secure with you, and if you can’t keep it safe, you will lose their business. Many clients with sensitive information actually demand that you have a rigid data security infrastructure in place before doing … Read moreIT Security Vulnerability vs Threat vs Risk: What are the Differences?

Minimizing the Risks to Your Business Using Security Measures and Disaster Planning

Instituting the proper workplace security measures and planning for disasters coupled with the right insurance coverage, are vital components in minimizing the risks to your business. Running a business means you learn to expect the unexpected. However, when events that are totally out of the ordinary course of business occur, if you don’t have a … Read moreMinimizing the Risks to Your Business Using Security Measures and Disaster Planning

PRIVACY AND DATA PROTECTION IN THE UAE

      Published on January 24, 2019     Authored by: Prof. Dr. Ir. Henk Jan Jansen The protection of personal data and privacy considerations are more important than ever due to globalisation and technological development. Although there are no explicit laws or authorities that deal specifically with privacy and data protection in the … Read morePRIVACY AND DATA PROTECTION IN THE UAE

Best way to reduce cost for your recruiting needs?

First of all, let me introduce myself first, I am Dr. Ir. Henk Jan Jansen, Head recruiting of Passport Business Engineering (RPO) Services. Who We Are: “Passport Business Engineering (RPO) Services” WE CAN CUT YOUR RECRUITING COSTS BY UPTO 70%! 100% DEDICATED to your needs Interested to know more? Do you want to know how … Read moreBest way to reduce cost for your recruiting needs?

So you want to be a security engineer?

Introduction Security engineering is different from traditional computer engineering: it requires a different mindset and viewpoint. I can spend hours going into the nuances of why and how, but instead I will point you to this eloquent essay by Parisa Tabriz. I strongly recommend reading it before continuing with the rest of this article. If you are … Read moreSo you want to be a security engineer?

How to Think Like an Attacker

Executive Summary Organizations are increasingly finding themselves in a situation where existing information security defense strategies and solutions are failing. Attackers are bypassing defenses by crafting highly targeted attacks and advanced malware to achieve their goals. This report discusses strategies for refocusing information security priorities and resources to protect the business’ valuable intellectual property. While … Read moreHow to Think Like an Attacker

Different Security Models

Security Models Introduction The essence of information security is to protect information. It is just that simple. So whenever possible do not make it more complicated than needed. Complexity for cyber security and privacy arise when information needs to be shared or must be made accessible by some digital device. The world where information was … Read moreDifferent Security Models

Today I learned something new about GDPR

General Data Protection Regulation GDPR Here you can find the Regulation (EU) 2016/679 (General Data Protection Regulation) as a neatly arranged overview. The European Data Protection Regulation is applicable as of May 25th, 2018 in all member states to harmonize data privacy laws across Europe. Quick Overview Chapter 1             –                1 2 3 4 Chapter … Read moreToday I learned something new about GDPR

Verified by MonsterInsights