by Eddie Taliaferro | Jul 22, 2019 | InfoSec Strategies
Reading Time: 2 minutes
It sometimes happens in the course of supporting clients during ISO 27001 certification projects or other information security assessments that we uncover “check-the-box” documents. For example, these might be policies that were... by Carla Higginbotham | May 22, 2019 | ISMS Consulting
Reading Time: 3 minutes
Disclaimer: We are a transparent organization, and this is going to be very (very) transparent. All day, every day I speak to CIOs, CTOs, CISOs, IT Directors, Risk Management Professionals, etc. in charge of managing information... by Bhaumik Shah | Feb 13, 2018 | InfoSec Strategies
Reading Time: 3 minutes
Enabling users to upload images, videos, documents and all manner of files is essential for many web applications, from social networking sites to web forums to intranet collaboration portals to document repositories to blog sites.... by Taylor Smith | Feb 1, 2018 | InfoSec Strategies
Reading Time: 2 minutes
Security researchers at the Romanian cybersecurity and antivirus software vendor Bitdefender have spotted what looks like the most sophisticated and potentially deadly botnet yet—possibly signaling a change in how malicious botnets... by Lou Romero | Oct 17, 2017 | InfoSec Strategies
Reading Time: 2 minutes
In my recent cyber security work with municipalities, I gained an appreciation for the information security challenges K-12 public school systems face. Because they manage troves of personal, health, financial and academic data,...