Imagine that someone detects a breach in one of your systems. How would you react? Would you dig into all of your network and host…
Can you ever be 100% sure you have completely cleaned up a compromised system after a breach? The only answer is no. You have to…
Part of training people into becoming ICS security specialists is providing them the opportunity to test or train certain things in a ‘safe’ environment. Which…
Setting up a new Cyber Security Operations Center (CSOC) within your organisation is a big step in increasing your incident monitoring and response efficiency, providing…
After attending the fifth Cyber and SCADA Security for Oil & Gas Industry conference, it became apparent lots of companies are having a hard time…
To set up a good cybersecurity program, there are 7 steps you should take. They will make sure the cybersecurity activities that you define fit…
Many organizations would like to obtain a certificate in order to objectively demonstrate GDPR compliance towards the market.
In this months newsletter: A guest article by Izar “Infosec Curmudgeon” Tarandach, Curated resources covering an awesome list of threat modeling resources.
As a DPO it’s your task to foresee adequate awareness. The accountability principle requires you to be able to objectively demonstrate compliance. So, here are…