Information Security Blog
Speaking at the recent CyberUK conference in Manchester, Dave Hogue, senior technical director of the Cybersecurity Threat Operations Center at the NSA, flatly stated: We have sophisticated adversaries using unsophisticated means to cause great damage. In fact, I’ll...read more
Editor's Note: This post was originally published in August 2013 and has been updated for accuracy and comprehensiveness. The other day one of our Lead Implementers was told a very interesting story by an ISO-27001 Lead Auditor who performs certification audits for a...read more
For the last 20 months or so, we’ve worked with nearly 200 government municipalities on cyber loss control projects, now largely completed. Data security is a major concern for many municipal governments, so in this post—the third in our Cyber Security Foundation for...read more
When your network goes through a penetration test, it’s a little like taking a journey on The Oregon Trail (remember that all-time-great video game?). Using a range of manual techniques supported by automated tools, your network infrastructure undergoes a simulated...read more
Failing to Plan is Planning to Fail—Download Our Business Continuity Plan (BCP) Tabletop Exercise Template Today!
There is no shortage of sobering statistics on how businesses that do no planning fare when disaster strikes: not well. In the absence of planning, people don’t know what to do and confusion reigns. That means it will take longer to recover from the disaster, and that...read more