Home Tags Information security

Tag: information security

Mapping of On-Premises Security Controls Versus Services Offered by Major Cloud...

Check out the post and hi-res image option here.

FROM STOLEN LAPTOP TO INSIDE THE COMPANY NETWORK via Dolosgroup.io

Check out this amazing story here.

The InfoGov World IG Survey closes soon

We want your valuable insights. Strategic partners InfoGov World Media, Hyland, Ricoh, Iron Mountain, Electronic Discovery Reference Model (EDRM), Certified Information Governance Officers Association (CIGOA),...

TEN YEARS OF BREACHES IN ONE IMAGE via THE VERGE

Nearly 8 billion usernames have leaked since June 2011

Information Governance: Take Small Bites to Avoid Choking

K’ung Fu-Tse (551–479 BC), or Confucius as he came to be known in the western world, is reputed to have said, “a man can eat...

Microsoft Reveals New Innocent Ways Windows Users Can Get Hacked via...

The article discusses what new vulnerabilities exist and how to close the gaps.

Top Malware and Other Threats Tracked by Center for Information Security...

Check out their threat site here.

New Certified IG Officers Association (CIGOA) vows to bring a global...

Check out the video below introducing the new CIGO association and certification.

State of Cybersecurity 2020, Part 2 Report Available and Free to...

Check out the report here...login required.

The Master CompTIA Training Bundle – Lifetime Access only $49.99

Become a Certified CompTIA Professional & Solve Basic to Expert-Level IT Issues with 200+ Hours of Video-Led Training

Top 10 Bulk Email Verification and Validation Services Compared via Accu...

This insightful post shows the technical, security, and privacy features with some popular bulk email software.

Free Webcast 4/14 at Noon Central: “Cybersecurity and IG” via ARMA...

Dear ARMA Members and Friends, Please join us for our lunch webinar tomorrow, April 14 at 12 noon tilted “Cybersecurity and IG” presented by...

Designing a doctoral program in cyber security for working professionals from...

A great research paper on the subject via this PDF.

Agenda Announced for Northern Virginia and Metropolitan Maryland chapters of ARMA...

Information Security In an Insecure World Wednesday, April 22, 2020, 8:15-4:45 Grant Thornton LLP, 1000 Wilson Boulevard, 15th Floor, Arlington, VA 22209 Jointly presented by the...

Webinar: What the ‘IG Maturity Index Report— 2020’ is Telling...

Description from registration site: Are organizations making sufficient progress in developing information governance (IG) programs? How can you determine if your program is...

Diversity in Tech Podcast Available

On this podcast, we’ll discover ways to increase representation in tech while sharing everyday stories of people of color in tech.

Configuration mistakes blamed for bulk of stolen records last year: IBM...

Misconfigured servers accounted for 86% of the record 8.5 billion records compromised in 2019 according to the article.

i-SIGMA provides recent listing of House and Senate Bills by State...

Check out the detailed list here

CISA Cyber Essentials: The Leaders Guide

The week of infographics and guides! Check out the NIST CISA Cyber Essentials guide here.

New HIPAA Security Risk Assessment Tool incorporates NIST framework

Version 3.1 of the HHS Security Risk Assessment (SRA) Tool features new functionality

Penetration Testers Arrested in Iowa Causing Controversy

Coalfire, a network penetration testing company, issued a press release regarding the arrest of their employees at an Iowa court house. The employees...

Hackers finding ways to exploit automotive software to overtake cars via...

This news is not new news to those who attend hacker cons, but it is important for car makers and auto suppliers to take...

Hacker education site – iR0nin – makes it easy for those...

Check out iRonin.com if you are interested to learn more about and keep up with cyber security. The about page says the following: "Let...
Mastodon