Risk terminology: Understanding assets, threats and vulnerabilities

Whether you’re addressing cyber security on your own, following ISO 27001 or using the guidance outlined in the GDPR (General Data Protection Regulation), the process begins by assessing the risks you face. You might have a broad idea of what a r… Continue reading Risk terminology: Understanding assets, threats and vulnerabilities

Why CISOs Should Own Application Rationalization

Reducing overlap and mitigating potential security gaps are just two reasons why application rationalization is a sound strategy A major cybersecurity concern many organizations and executives may not be aware of but will become more prevalent in year… Continue reading Why CISOs Should Own Application Rationalization

Why does GDPR Matter in the Tech and Media Industry?

Robust have never been so high-profile. The introduction of the EU GDPR (General Data Protection Regulation) in May 2018 put personal data protection firmly in the public consciousness. Cybercrime continues to grab headlines, with attacks causing massi… Continue reading Why does GDPR Matter in the Tech and Media Industry?

Use This NERC CIP v6 Standards Summary to Stay Compliant

Thanks to FERC’s Order 822, the North American Electric Reliability Corporation’s critical infrastructure protection standards, known as NERC CIP, are continually updated. Seven updated standards proposed by NERC for inclusion have now been… Continue reading Use This NERC CIP v6 Standards Summary to Stay Compliant