What is the industry-standard recommendation for where non-functional security requirements end and enterprise requirements begin?

I have been tasked with coming up with security requirements for a project. I am finding it difficult to find the line between where project specific, nonfunctional requirements end and general security requirements for the enterprise begi… Continue reading What is the industry-standard recommendation for where non-functional security requirements end and enterprise requirements begin?

Why customers don’t trust your organisation with their personal data

An ICO (Information Commissioner’s Office) report has found that 45% of customers don’t trust organisations with their personal data.   This is hardly surprising, given the constant news stories about cyber attacks and organi… Continue reading Why customers don’t trust your organisation with their personal data

What useful sources can help us in the development of a functional and non-functional security requirement baseline?

We’re setting up an secure development and vulnerability management process in our firm. Our firm develops several IT solutions in parallel. The process will influence the way we develop those IT solutions because it introduc… Continue reading What useful sources can help us in the development of a functional and non-functional security requirement baseline?

GDPR data mapping key elements

Data mapping will be a key part of your compliance project in the run-up to the EU General Data Protection Regulation (GDPR) compliance deadline of May 2018. The Regulation introduces numerous changes – and the change from complying with the curr… Continue reading GDPR data mapping key elements