25.8 C
Bengaluru

Standards & Compliance

Last week New York Times revealed that former USA state secretary Hillary Clinton used a private email account instead of official email address for communications while serving the State department. It is reported that Clinton used...
It is a no brainer to mention that cyber crime is increasing and today, the focus is more on money & cyber war than anything else. We see a lot of such incidents these days including...

PCI DSS compliance and Password policy

Usernames and passwords is still the major method of authenticating users to the systems. It would be difficult to find someone without a user...

Cyber security risks and cyber incidents.SEC Guidance

Division of Corporation Finance at Securities and Exchange Commission has released guidance on reporting the cyber security risks and cyber incidents. This has come...

NIST guide for managing cloud security and privacy

Cloud computing is gaining its popularity in an accelerated mode and many businesses and government entities are adopting cloud computing for supporting their business...

Guide for Applying the Risk Management Framework to Federal Information Systems: A Security Life Cycle Approach.

NIST has recently released the final publication of the "Guide for Applying the Risk Management Framework to Federal Information Systems: A Security Life Cycle...

Guide to ISO 31000

Three risk associations, Airmic, Alarm, and the IRM, have collaborated to publish a free guide to ISO 31000 titled "A structured approach to...

NIST Updates Automated Computer Security Validation Guidelines

The National Institute of Standards and Technology (NIST) has issued a draft publication for public comment that describes changes to the Security Content Automation...

NIST publishes the Guide to Enterprise Telework and Remote Access

Final issue has published the final version of the standard for enterprise will telework and remote access security. The...

New draft security documents from NIST

NIST has recently published 4 draft security guides for public comment DRAFT Guide to Bluetooth Security Guide to Bluetooth Security,...

HIPAA Security Compliance

The Health Insurance Portability and Accountability Act (HIPAA) was enacted by the U.S. Congress in 1996 Title II of HIPAA, the Administrative Simplification provisions,...

10 Steps for an effective ISMS

IntroductionInformation Security is becoming more and more of important in the present and coming days of business. To meet the...

How to implement ISO 27001 ?

Information Security Standards Information Security is a business requirement in today.s corporate world. These requirements are driven either by business need or by regulations. Many...

BS7799 – IT Security Controls

Technical Security Controls, commonly known as IT Security controls, is an important component for protecting your IT infrastructure of your...

Recent articles