Quantcast
Channel: InfoSecWriters.com - Red Tape
Browsing latest articles
Browse All 71 View Live

Image may be NSFW.
Clik here to view.

Developing a Secure Manufacturing Industrial Internet of Things (IIOT)...

Contributed by Andres Castillo  Technology advances constantly and in the process of developing new ways to collect data, new security concerns become more prevalent. In order to increase profit,...

View Article



Image may be NSFW.
Clik here to view.

Hacking the Human

Contributed by David McDaniel Information security professionals must plan for, identify, and mitigate threats originating from a myriad of sources. While these individuals and teams are required to...

View Article

Image may be NSFW.
Clik here to view.

Managing Access in an Enterprise Environment

Contributed by Marc Colonna Access control starts with the front door to the organization, continues with appropriate security in and outside of the data center, and finishes with good user education....

View Article

Image may be NSFW.
Clik here to view.

Role of Machine Learning in change of Identity and Access Management: A...

Contributed by Subhrodip Roy Chowdhury In recent years, machine learning is revolutionizing almost every field of science due to its unique properties like adaptability, scalability and ability to...

View Article

Image may be NSFW.
Clik here to view.

Information Security Management – Current Threats, Challenges, & Mitigations

Contributed by Mark E. Turner Security threats continue to present challenges to both private and public sectors. Evidence of this problem is provided in daily news reports of data breaches involving...

View Article


Image may be NSFW.
Clik here to view.

The Effectiveness of Governance and Regulatory Bodies in Protecting...

Contributed by James Robinson Appropriate and proper understanding and of IT security should be considered an essential and pertinent requirement within any modern business amongst its executives and...

View Article

Image may be NSFW.
Clik here to view.

Developing a Security Awareness Program

Contributed by Mark Heckle In today’s environment, technology has become a way of doing business. Because of technology, information security has become a necessary factor in how we use technology in...

View Article

Image may be NSFW.
Clik here to view.

Risk Management: What is it, Why is it Important, and How to do it?

Contributed by Richard Parker Risk Management is the process whereby an organization identifies the risk, makes an assessment of the risk, identifies any mitigation that can be done to control the...

View Article


Image may be NSFW.
Clik here to view.

Assistive Technologies, Risk, Legal & Ethical Considerations

Contributed by Matthew HesterIn the summer of 2016 the United Nations declared that access to the internet is a basic human right when it amended article 19 of the Universal Declaration of Human...

View Article


Image may be NSFW.
Clik here to view.

The Journey from Unmanaged to a Managed Risk Management Program

Contributed by Kevin Thompson  Over the five years my organization has pursued becoming more organized in their information security program. To develop an effective program, the organization must...

View Article
Browsing latest articles
Browse All 71 View Live




Latest Images