Management, compliance & auditing April 16, 2014 Ryan Mazerik Information Security Policies Organisations are giving more priority to development of information security policies, as protecting their assets is one of the prominent things that needs...
Management, compliance & auditing March 27, 2014 Chintan Gurjar Information Security Policy For SME Information security (IS) is a critical part of any small scale company and a big enterprise, and a challenge for any firm. Information security involves very...
Management, compliance & auditing February 19, 2014 John Fox Top 10 Common Misconceptions About Application Whitelisting Application Whitelisting is a technology that has been in use in the security world for quite a long time. For those who may not already be familiar with AWL,...
Management, compliance & auditing February 14, 2014 Infosec Regulators Protect Their Data: Who’s Protecting Yours? By Chris Clymer, SecureState Advisory Manager and Kerstyn Clover, SecureState Consultant If there’s one constant for security practitioners across virtually...
Management, compliance & auditing January 2, 2014 Dejan Lukan OSSEC Introduction In this article we'll present the open source host-based intrusion detection system, which is needed if we would like to detect host-based attacks...
Management, compliance & auditing September 26, 2013 Karthik Enterprise Security Management An enterprise invests considerable amount of time in its day to day scanning and managing patched for the infrastructure. But, an enterprise psychological analysis...
Management, compliance & auditing September 20, 2013 Robert Barnes Conditional Complexity of Risk Models Introduction "Conditional complexity" (also called cyclomatic complexity) is a term used to measure the complexity of software. The term refers to the number...
Management, compliance & auditing August 28, 2013 Dimitar Kostadinov U.S. Cyber Policy – Course and Legal Aspects Image courtesy of Gualberto107 / FreeDigitalPhotos.net Introduction Cyber policy is an important issue that many would qualify as pending. Even leading...
Management, compliance & auditing April 19, 2013 Daniel Dimov Software Patent Law: EU, New Zealand, and the US compared 1. Introduction A patent is defined as an exclusive right or rights provided by a government to an inventor for a certain period of time in exchange for the...
Management, compliance & auditing April 8, 2013 Infosec Your Guide to the HP Cyber Risk Report By: Geoffrey Vaughana a Security Consultant at Security Compass This year at the RSA Conference HP officially released its annual Cyber Risk Report. This...