3 Best Practices for Customizing Your Compliance Program

Most large-scale entities need to prove compliance with multiple regulatory standards. In their efforts to meet their compliance mandates, organizations could suffer a major drain on their time and resources. This possibility holds true regardless of w… Continue reading 3 Best Practices for Customizing Your Compliance Program

4 Considerations for a Secure Cloud Environment

Digital attackers are increasingly turning their attention to the cloud. According to the 2020 Trustwave Global Security Report, the volume of attacks targeting cloud services more than doubled 7% in 2018 to 20% a year later. This growth made cloud ser… Continue reading 4 Considerations for a Secure Cloud Environment

Contact Tracing: De-mystifying How an App Designed to Track People Can Ensure User Privacy and Security

Many governments in many countries around the world recognise that contact tracing plays a very important part to reduce the spread of the deadly disease, COVID-19. In this article, we take a look at the conventional method of contact tracking and comp… Continue reading Contact Tracing: De-mystifying How an App Designed to Track People Can Ensure User Privacy and Security

Dispelling 5 Myths and Misconceptions Surrounding File Integrity Monitoring (FIM)

File integrity monitoring (FIM) started back in 1997 when Gene Kim launched Tripwire and its “Change Audit” solution. Just a few years later, Change Audit became FIM; this rebranded tool worked with the 12 security controls identified in Vi… Continue reading Dispelling 5 Myths and Misconceptions Surrounding File Integrity Monitoring (FIM)

Dispelling 5 Myths and Misconceptions Surrounding File Integrity Monitoring (FIM)

File integrity monitoring (FIM) started back in 1997 when Gene Kim launched Tripwire and its “Change Audit” solution. Just a few years later, Change Audit became FIM; this rebranded tool worked with the 12 security controls identified in Vi… Continue reading Dispelling 5 Myths and Misconceptions Surrounding File Integrity Monitoring (FIM)

Why You Need a Concrete Incident Response Plan (Not Strategy)

Recently, I had the privilege to be part of a four-person discussion panel at a security event in London where the topic was about incident response. The panel was hosted by another security professional, and over 50 professionals from the industry wer… Continue reading Why You Need a Concrete Incident Response Plan (Not Strategy)

All I Want for Christmas… Is a New SSL Certificate

On Thursday 6th December, 2018, I realized how dependent I was on my mobile phone having an internet connection. That particular day, I was out and about away from Wi-Fi networks. The first time I noticed I had no connectivity was when I used my phone … Continue reading All I Want for Christmas… Is a New SSL Certificate

Infosecurity Europe 2018: Being the First to Respond in the Digital World

The world is full of first responders. You may not realize it, but you will know someone who is a first responder. Typically, one would associate a first responder with the three main emergency professions: Ambulance, Police and Fire. Within the Ambula… Continue reading Infosecurity Europe 2018: Being the First to Respond in the Digital World

How PCI/DSS Compliance Can Protect Your Systems against New Ransomware Threats

Two significant ransomware attacks occurred in the first half of 2017. The first outbreak took place on May 12, 2017, when WannaCry leveraged a known Windows exploit to infect hundreds of thousands of vulnerable computers around the world, including 34… Continue reading How PCI/DSS Compliance Can Protect Your Systems against New Ransomware Threats