If a vulnerability has no relevant attack vectors, is monitoring still legitimate for a company?

Today while reviewing vulnerability scan results with a colleague, we had a debate about what vulnerabilities can be considered “true or legitimate” and hence worthwhile to spend resources in monitoring. We had a differing op… Continue reading If a vulnerability has no relevant attack vectors, is monitoring still legitimate for a company?

How should security user training be provided when implementing a company BYOD strategy?

Our company is implementing a BYOD policy. I am working with management to draft end user training guidelines / standards as senior member of the Information Security team. Our company is in a regulated industry and works rou… Continue reading How should security user training be provided when implementing a company BYOD strategy?