React to incidents in an organised way by using the Playbook model

Imagine that someone detects a breach in one of your systems. How would you react? Would you dig into all of your network and host…

3 recommendations to protect your data

Can you ever be 100% sure you have completely cleaned up a compromised system after a breach? The only answer is no. You have to…

Part of training people into becoming ICS security specialists is providing them the opportunity to test or train certain things in a ‘safe’ environment. Which…

4 pitfalls to avoid when building a CSOC

Setting up a new Cyber Security Operations Center (CSOC) within your organisation is a big step in increasing your incident monitoring and response efficiency, providing…

After attending the fifth Cyber and SCADA Security for Oil & Gas Industry conference, it became apparent lots of companies are having a hard time…

7 steps to set up a cybersecurity program

To set up a good cybersecurity program, there are 7 steps you should take. They will make sure the cybersecurity activities that you define fit…

GDPR standard as forerunner for GDPR ISO standardisation

Many organizations would like to obtain a certificate in order to objectively demonstrate GDPR compliance towards the market.

Why hackers won’t save you (even) in 2020 (and what to do about it).
Why hackers won't save you (even) in 2020 (and what to do about it). The most important challenges for you at a glance. Official figures…
TMI newsletter 9 How often do living documents need to breathe?

In this months newsletter: A guest article by Izar “Infosec Curmudgeon” Tarandach, Curated resources covering an awesome list of threat modeling resources.

Tips for demonstrating compliance to the awareness requirement

As a DPO it’s your task to foresee adequate awareness. The accountability principle requires you to be able to objectively demonstrate compliance. So, here are…

Start typing and press Enter to search

Shopping Cart