Developing a Secure Manufacturing Industrial Internet of Things (IIOT)...
Contributed by Andres Castillo Technology advances constantly and in the process of developing new ways to collect data, new security concerns become more prevalent. In order to increase profit,...
View ArticleHacking the Human
Contributed by David McDaniel Information security professionals must plan for, identify, and mitigate threats originating from a myriad of sources. While these individuals and teams are required to...
View ArticleManaging Access in an Enterprise Environment
Contributed by Marc Colonna Access control starts with the front door to the organization, continues with appropriate security in and outside of the data center, and finishes with good user education....
View ArticleRole of Machine Learning in change of Identity and Access Management: A...
Contributed by Subhrodip Roy Chowdhury In recent years, machine learning is revolutionizing almost every field of science due to its unique properties like adaptability, scalability and ability to...
View ArticleInformation Security Management – Current Threats, Challenges, & Mitigations
Contributed by Mark E. Turner Security threats continue to present challenges to both private and public sectors. Evidence of this problem is provided in daily news reports of data breaches involving...
View ArticleThe Effectiveness of Governance and Regulatory Bodies in Protecting...
Contributed by James Robinson Appropriate and proper understanding and of IT security should be considered an essential and pertinent requirement within any modern business amongst its executives and...
View ArticleDeveloping a Security Awareness Program
Contributed by Mark Heckle In today’s environment, technology has become a way of doing business. Because of technology, information security has become a necessary factor in how we use technology in...
View ArticleRisk Management: What is it, Why is it Important, and How to do it?
Contributed by Richard Parker Risk Management is the process whereby an organization identifies the risk, makes an assessment of the risk, identifies any mitigation that can be done to control the...
View ArticleAssistive Technologies, Risk, Legal & Ethical Considerations
Contributed by Matthew HesterIn the summer of 2016 the United Nations declared that access to the internet is a basic human right when it amended article 19 of the Universal Declaration of Human...
View ArticleThe Journey from Unmanaged to a Managed Risk Management Program
Contributed by Kevin Thompson Over the five years my organization has pursued becoming more organized in their information security program. To develop an effective program, the organization must...
View Article
More Pages to Explore .....