Ransomware is a type of malware that encrypts a victim's files. The attackers then demand a ransom from the victim to restore access to the files upon payment. Ransomware attacks are becoming increasingly common, with billions...
Last week New York Times revealed that former USA state secretary Hillary Clinton used a private email account instead of official email address for communications while serving the State department. It is reported that Clinton used...
PCI DSS compliance and Password policy
Usernames and passwords is still the major method of authenticating users to the systems. It would be difficult to find someone without a user...
Cyber security risks and cyber incidents.SEC Guidance
Division of Corporation Finance at Securities and Exchange Commission has released guidance on reporting the cyber security risks and cyber incidents. This has come...
NIST guide for managing cloud security and privacy
Cloud computing is gaining its popularity in an accelerated mode and many businesses and government entities are adopting cloud computing for supporting their business...
Guide for Applying the Risk Management Framework to Federal Information Systems: A Security Life Cycle Approach.
NIST has recently released the final publication of the "Guide for Applying the Risk Management Framework to Federal Information Systems: A Security Life Cycle...
Guide to ISO 31000
Three risk associations, Airmic, Alarm, and the IRM, have collaborated to publish a free guide to ISO 31000 titled "A structured approach to...
NIST Updates Automated Computer Security Validation Guidelines
The National Institute of Standards and Technology (NIST) has issued a draft publication for public comment that describes changes to the Security Content Automation...
NIST publishes the Guide to Enterprise Telework and Remote Access
Final issue has published the final version of the standard for enterprise will telework and remote access security. The...
New draft security documents from NIST
NIST has recently published 4 draft security guides for public comment DRAFT Guide to Bluetooth Security Guide to Bluetooth Security,...
HIPAA Security Compliance
The Health Insurance Portability and Accountability Act (HIPAA) was enacted by the U.S. Congress in 1996 Title II of HIPAA, the Administrative Simplification provisions,...
10 Steps for an effective ISMS
IntroductionInformation Security is becoming more and more of important in the present and coming days of business. To meet the...
How to implement ISO 27001 ?
Information Security Standards
Information Security is a business requirement in today.s corporate world. These requirements are driven either by business need or by regulations. Many...
BS7799 – IT Security Controls
Technical Security Controls, commonly known as IT Security controls, is an important component for protecting your IT infrastructure of your...