Yes, that is a rabbit on a lead.View Entire Post ›
The business context for information risk and security
Although the
organisational/business context is clearly relevant and important to information risk and
security management, it is tricky to describe. In my opinion, clause 4 of ISO/IEC 27001 is so succinct that it leaves readers perplexed as to …
5 Best Nightstand Gun Safes [COMPREHENSIVE GUIDE for 2022]
Our Top Pick: Vaultek VR10 Smart Handgun Safe Best Overall Vaultek VR10 Smart Handgun Safe The Vaultek VR10 deserves a top spot because of its impressive features, such as portability and slim design. The safe is made of thick 18-gauge steel and includ…
What?s New for Developers: June 2022
Read about our recent Terraform updates and managed database services, our latest Meet the Developer articles, and stream videos on edge computing.
Google Warns Spyware Being Deployed Against Android, iOS Users
The company is warning victims in Italy and Kazakhstan that they have been targeted by the malware from Italian firm RCS Labs.
The sadly neglected Risk Treatment Plan
For some curious reason, the Statement of Applicability steals the limelight in the ISO27k world, despite being little more than a formality. Having recently blogged about the dreaded SoA, ’nuff said on that.Today I’m picking up on the SoA’s shy …
The Relentless Evolution of DDoS Attacks
Explore how DDoS attacks are practically unrecognizable from those of the past few years thanks to constant innovation in the threat landscape
Infosec principles (Hinson tips)
Thinking about the principles underpinning information risk and security, here’s a tidy little stack of 44 “Hinson tips” – one-liners to set the old brain cells working this chilly mid-Winter morning:Address information confidentiality, integrity and a…
Kazakh Govt. Used Spyware Against Protesters
Researchers have discovered that a Kazakhstan government entity deployed sophisticated Italian spyware within its borders.
WANTED: a set of infosec principles we can all agree on
The SecAware corporate information security policy template incorporates a set of generic principles for information risk and security such as “Our Information Security Management System
conforms to generally accepted good security practices as descri…