Search Results for: security controls Blog Post Detective Security Controls December 4, 2020 Organizations implement technical, administrative, and physical controls to maintain an adequate level of security posture. The nature of these controls... Blog Post Corrective Security Controls November 30, 2020 Organizations implement a comprehensive set of security controls to minimize their risks. For security professionals, it is necessary to understand... Blog Post Preventive Security Controls November 18, 2020 In IT security, there are certain controls that one has to implement to maintain a certain security level, react to... Blog Post Compensatory Security Controls: The Alternative Solution December 18, 2020 In the modern-day threat landscape, organizations cannot sit back and wait for an attack to happen. They need to implement... Blog Post How to Implement CIS Controls to Connect With Confidence May 19, 2021 Short for Center for Internet Security, the CIS is an independent non-profit organization dedicated to creating confidence in the connected... Blog Post Defense In Depth (DiD): What Is It And Why Is It Important? February 15, 2021 Defense in depth, or DiD, is an information security approach where organizations implement multiple layers of security controls. There will... Blog Post “Security Controls Should Harmonize Like Orchestra” – Interview With Ondrej Krehel, LIFARS’ CEO And Founder: Part 1 October 15, 2020 Ondrej Krehel, CEO & Founder of LIFARS is recognized world-wide for his Digital Forensic expertise and Ethical Hacking. He actively... Blog Post Lack of Visibility into Key Security Controls is a Big Problem for Cybersecurity Teams August 7, 2020 The 2020 State of Enterprise Security Posture Report published findings that are concerning for the overall cybersecurity of organizations. It... Blog Post Security Information and Event Management Series Part 4: Selecting a SIEM vendor November 9, 2020 In this last part of our series on SIEM, we will try to provide recommendations on selecting a SIEM vendor.... Blog Post Security Information and Event Management Series Part 3: Main capabilities of SIEM November 2, 2020 In the first part of this four-part series, we covered the need for SIEM solutions and explained the fundamentals. Then,... Blog Post Security Information and Event Management Series Part 2: Types of SIEM solutions October 26, 2020 In the first part of this four-part series, we covered the need for Security Information and Event Management (SIEM) solutions... Blog Post Security Information and Event Management Series Part 1: Introduction To SIEM October 19, 2020 Cyber-attacks are consistently increasing, and as a result, so is the resulting damage. While attackers can target any organization as... Blog Post New Year’s Cyber Security Resolutions for a Safer and more Secure 2021 January 29, 2021 A new year is upon us, and it’s a time to look forward to building on past successes and make... Blog Post How To Include Information Security In Project Management? February 2, 2021 When the internet and computer systems were getting popular in the 1980s and 1990s, security was not a significant concern.... Blog Post The Role Of Disciplinary Process In Employee Conformance With Policies February 3, 2021 Disciplinary process is one of those activities that you will often find the managers running away from. In a workplace...
Blog Post Detective Security Controls December 4, 2020 Organizations implement technical, administrative, and physical controls to maintain an adequate level of security posture. The nature of these controls...
Blog Post Corrective Security Controls November 30, 2020 Organizations implement a comprehensive set of security controls to minimize their risks. For security professionals, it is necessary to understand...
Blog Post Preventive Security Controls November 18, 2020 In IT security, there are certain controls that one has to implement to maintain a certain security level, react to...
Blog Post Compensatory Security Controls: The Alternative Solution December 18, 2020 In the modern-day threat landscape, organizations cannot sit back and wait for an attack to happen. They need to implement...
Blog Post How to Implement CIS Controls to Connect With Confidence May 19, 2021 Short for Center for Internet Security, the CIS is an independent non-profit organization dedicated to creating confidence in the connected...
Blog Post Defense In Depth (DiD): What Is It And Why Is It Important? February 15, 2021 Defense in depth, or DiD, is an information security approach where organizations implement multiple layers of security controls. There will...
Blog Post “Security Controls Should Harmonize Like Orchestra” – Interview With Ondrej Krehel, LIFARS’ CEO And Founder: Part 1 October 15, 2020 Ondrej Krehel, CEO & Founder of LIFARS is recognized world-wide for his Digital Forensic expertise and Ethical Hacking. He actively...
Blog Post Lack of Visibility into Key Security Controls is a Big Problem for Cybersecurity Teams August 7, 2020 The 2020 State of Enterprise Security Posture Report published findings that are concerning for the overall cybersecurity of organizations. It...
Blog Post Security Information and Event Management Series Part 4: Selecting a SIEM vendor November 9, 2020 In this last part of our series on SIEM, we will try to provide recommendations on selecting a SIEM vendor....
Blog Post Security Information and Event Management Series Part 3: Main capabilities of SIEM November 2, 2020 In the first part of this four-part series, we covered the need for SIEM solutions and explained the fundamentals. Then,...
Blog Post Security Information and Event Management Series Part 2: Types of SIEM solutions October 26, 2020 In the first part of this four-part series, we covered the need for Security Information and Event Management (SIEM) solutions...
Blog Post Security Information and Event Management Series Part 1: Introduction To SIEM October 19, 2020 Cyber-attacks are consistently increasing, and as a result, so is the resulting damage. While attackers can target any organization as...
Blog Post New Year’s Cyber Security Resolutions for a Safer and more Secure 2021 January 29, 2021 A new year is upon us, and it’s a time to look forward to building on past successes and make...
Blog Post How To Include Information Security In Project Management? February 2, 2021 When the internet and computer systems were getting popular in the 1980s and 1990s, security was not a significant concern....
Blog Post The Role Of Disciplinary Process In Employee Conformance With Policies February 3, 2021 Disciplinary process is one of those activities that you will often find the managers running away from. In a workplace...