Friday, April 10, 2020
Home Tags Security

Tag: Security

Designing a doctoral program in cyber security for working professionals from...

A great research paper on the subject via this PDF.

A Massive U.S. Property and Demographic Database – Hosted on Google...

Read more about this story here.

Configuration mistakes blamed for bulk of stolen records last year: IBM...

Misconfigured servers accounted for 86% of the record 8.5 billion records compromised in 2019 according to the article.

Top Posts on IG GURU in 2019

Security, blockchain, legacy media (tape), leadership, frameworks, and misuse of information continue to be popular topics on IG GURU. Below are...

CISA Cyber Essentials: The Leaders Guide

The week of infographics and guides! Check out the NIST CISA Cyber Essentials guide here.

New HIPAA Security Risk Assessment Tool incorporates NIST framework

Version 3.1 of the HHS Security Risk Assessment (SRA) Tool features new functionality

Throwback article is a good reminder on how mobile devices are...

The Many Identifiers in Our Pockets

Inmates built computers hidden in ceiling, connected them to prison network...

An amazing story out of Ohio showing how inmates were able to build computers and connect to the prison network.

Work Ruined Email by the Atlantic

It’s not too late to fix it.

FaceApp responds to privacy concerns via TechCrunch

A few weeks ago FaceApp spread like wildfire. Soon after news came out that FaceApp is based in Russia. FaceApp...

What Is the Difference Between IT Security and Cybersecurity?

Monday, June 17, 2019 by James Stanger Some people seem to use the terms IT security, information security and cybersecurity...

Pledges to Not Pay Ransomware Hit Reality

While risk analysts and security experts continue to urge companies to secure systems against ransomware, they are now also advising that firms be ready to pay.

How to Create an Effective Cybersecurity Routine

by James Daily When it comes to your business security and company safety, there’s currently nothing more important than...

City in Florida Pays $600,000 in Bitcoin for Ransom

June 20th, 2019 via DailyHodl Following a cyber attack that began on May 29th, the city council of Riviera...

The Information Governance Reference Model You Haven’t heard of…

The CGOC Information Governance Process Maturity Model provides a maturity model for the 22 specific processes for key information stakeholders, including legal,...

THE PRIVACY PROJECT – A project done by the NY Times

From the NY Times Companies and governments are gaining new powers to follow people across the internet and around...

Hackers once stole a casino’s high-roller database through a thermometer in...

The CEO of the cybersecurity firm Darktrace says hackers are increasingly targeting unprotected "internet of things" devices, such as air-conditioning systems and...

The Ultimate Online Privacy Guide

Written by Douglas Crawford Introduction Edward Snowden's NSA spying revelations highlighted...

Norsk Hydro ransomware incident losses reach $40 million after one week

Norsk Hydro up and running with the exception of one business unit where "operations remain almost at a standstill."

NEW ERA FOR SHREDDING COMPANIES

Next week marks the first annual conference of i-Sigma, the new association created after the merger of the National Association for Information Destruction (NAID) and PRISM...

CISO: The C-Level executive missing from your board

By a CyberFeminist Hacker, currently Regional Business Information Security Officer

Cloud Danger

February 25, 2019 There is much talk, hype, promise and motion around companies moving into the cloud. From pulling...

OSI Model for beginners…

by Chris Roberts Thought it was time to update this based on the number of folks coming into the...

Webinar: GDPR and its Impact on Info Management & Governance

It's now 10 months since GDPR (General Data Protection Regulation) went live, and you may have asked yourself:  Was...