What is NEI 08-09?

Most organizations with industrial control systems (ICS) fall into one of two categories: regulated and non-regulated. For those subject to government imposed regulatory requirements, the selection of a cybersecurity framework is obviously compelling. … Continue reading What is NEI 08-09?

Concerns and Challenges Towards an Effective Cloud Security

In July 2019, Capital One made news headlines not for achieving another milestone but because it had been breached. Capital One was using AWS cloud services, as many businesses are doing nowadays. The problem stemmed (in part) because Capital One had a… Continue reading Concerns and Challenges Towards an Effective Cloud Security

GDPR One Year Anniversary: The Civil Society Organizations’ View

GDPR is a landmark in privacy jurisdiction. Through its 99 articles, it sets a framework for both businesses and individuals on their rights and responsibilities when it comes to protecting privacy. The most important element in my opinion is that priv… Continue reading GDPR One Year Anniversary: The Civil Society Organizations’ View

What Is the ISA/IEC 62443 Framework?

Cybersecurity threats to manufacturing and process plants are coming from a wide range of attack vectors including supply chain, logistics, enterprise computing, remote connections, operator stations, programmable logic controllers, distributed control… Continue reading What Is the ISA/IEC 62443 Framework?

Strong Customer Authentication: A Vehicle for PCI-DSS Compliance

Second Payment Services Directive (PSD2) Payment services that operate electronically should adopt technologies that guarantees the safe authentication of the user and reduces, to the maximum extent possible, the risk of fraud. In order to achieve this… Continue reading Strong Customer Authentication: A Vehicle for PCI-DSS Compliance

Insider Threats: Root Causes and Mitigation Practices

The Importance of Insider Threats The recent IBM 2019 Cost of Data Breach survey found that the cost of a data breach had risen 12% over the past 5 years to $3.92 million on average. While 51% of the data breach attacks were attributed to malicious or … Continue reading Insider Threats: Root Causes and Mitigation Practices

IBM Study Shows Data Breach Costs on the Rise

For the 14th consecutive year, IBM Security released its annual Data Breach Report that examines the financial impact of data breaches on organizations. According to the report, the cost of a data breach has risen 12% over the past 5 years to $3.92 mil… Continue reading IBM Study Shows Data Breach Costs on the Rise

Protecting Modern IoMT Against Cybersecurity Challenges

Even though the healthcare industry has been slower to adopt Internet of Things technologies than other industries, the Internet of Medical Things (IoMT) is destined to transform how we keep people safe and healthy, especially as the demand for lowerin… Continue reading Protecting Modern IoMT Against Cybersecurity Challenges

IoT Devices — Why Risk Assessment is Critical to Cybersecurity

The IoT Threat Landscape As technology continues to pervade modern-day society, security and trust have become significant concerns. This is particularly due to the plethora of cyber attacks that target organizations, governments and society. The tradi… Continue reading IoT Devices — Why Risk Assessment is Critical to Cybersecurity

The 2019 SANS Security Awareness Report: Awareness Training Is Rising

The Case for Security Awareness Training Cybersecurity and cyber security awareness are critical to business survival in an era dominated by growing virtual crime. It might be true that most people know about costly identity theft and reputation-destro… Continue reading The 2019 SANS Security Awareness Report: Awareness Training Is Rising