Search Results for: security risk Blog Post Are open ports a security risk? October 14, 2020 Ports are numbers that are used in TCP and UDP protocols for identification of applications. While some applications use well-known... Blog Post FBI Warns of Windows 7 end-of-life Security Risk August 28, 2020 Earlier this month, the FBI sent out a warning to U.S. private sector partners about the Windows 7 operating system.... Blog Post Risk assessment according to NIST SP 800-30 March 3, 2021 The SP 800-30 Guide for Conducting a Risk Assessment is a guideline by the National Institute of Standards and Technology... Blog Post Understanding & Integrating Cyber Security Risks into A Risk Management Program January 15, 2020 Cybersecurity is a field that protects the confidentiality, integrity, and availability of digital information. We are now at... Blog Post Organizing Cyber Security Risks in a Company January 5, 2020 Looking Back 5 Years, Looking Forward 5 Years in our Digitally Connected World In the past five years, we have... Blog Post Cyber Security Risks Related to the Novel Coronavirus – COVID 19 March 11, 2020 We in LIFARS are carefully following the latest developments in the cyber security realm. Thus, we are not surprised, that... Blog Post Threat, vulnerability, risk: What is the difference? July 22, 2020 Threat, vulnerability and risk are terms that are commonly mixed up. However, their understanding is crucial for building effective... Blog Post Your Security Cameras Are A Risk! January 24, 2020 Since the development of IoT devices, IP security cameras have become more and more popular. Smart cameras are like... Blog Post Segregation Of Duties: Common Approaches, Issues, And Implementation January 27, 2021 For modern-day businesses, segregation of duties (SoD) is a primary requirement to demonstrate compliance with various laws, regulations, and standards.... Blog Post Incident Types and Taxonomies Used in Cybersec Community May 11, 2021 In the face of this complex and multi-faceted landscape of threat actors and IoCs, security experts can benefit greatly from... Page Information Security Newsletter – Data Security, Cyber Defense Strategy and Risk Vulnerability Management Tips May 22, 2020 Blog Post How To Include Information Security In Project Management? February 2, 2021 When the internet and computer systems were getting popular in the 1980s and 1990s, security was not a significant concern.... Blog Post CREST Incident Response Maturity Assessment March 16, 2021 CREST is an international not-for-profit accreditation and certification body that represents and supports the technical information security market. CREST’s mission... Blog Post Shadow IT: The Risks, How it Gets Exploited, Its Mitigation Steps January 7, 2021 Shadow IT refers to the use of IT applications, software, and hardware without the corporate IT department’s approval and knowledge.... Page Post Ransomware Threat Hunting Services July 9, 2020 Elevate your organization’s cloud security posture from strategy to incident response. As more companies select different SaaS, IaaS and PaaS...
Blog Post Are open ports a security risk? October 14, 2020 Ports are numbers that are used in TCP and UDP protocols for identification of applications. While some applications use well-known...
Blog Post FBI Warns of Windows 7 end-of-life Security Risk August 28, 2020 Earlier this month, the FBI sent out a warning to U.S. private sector partners about the Windows 7 operating system....
Blog Post Risk assessment according to NIST SP 800-30 March 3, 2021 The SP 800-30 Guide for Conducting a Risk Assessment is a guideline by the National Institute of Standards and Technology...
Blog Post Understanding & Integrating Cyber Security Risks into A Risk Management Program January 15, 2020 Cybersecurity is a field that protects the confidentiality, integrity, and availability of digital information. We are now at...
Blog Post Organizing Cyber Security Risks in a Company January 5, 2020 Looking Back 5 Years, Looking Forward 5 Years in our Digitally Connected World In the past five years, we have...
Blog Post Cyber Security Risks Related to the Novel Coronavirus – COVID 19 March 11, 2020 We in LIFARS are carefully following the latest developments in the cyber security realm. Thus, we are not surprised, that...
Blog Post Threat, vulnerability, risk: What is the difference? July 22, 2020 Threat, vulnerability and risk are terms that are commonly mixed up. However, their understanding is crucial for building effective...
Blog Post Your Security Cameras Are A Risk! January 24, 2020 Since the development of IoT devices, IP security cameras have become more and more popular. Smart cameras are like...
Blog Post Segregation Of Duties: Common Approaches, Issues, And Implementation January 27, 2021 For modern-day businesses, segregation of duties (SoD) is a primary requirement to demonstrate compliance with various laws, regulations, and standards....
Blog Post Incident Types and Taxonomies Used in Cybersec Community May 11, 2021 In the face of this complex and multi-faceted landscape of threat actors and IoCs, security experts can benefit greatly from...
Page Information Security Newsletter – Data Security, Cyber Defense Strategy and Risk Vulnerability Management Tips May 22, 2020
Blog Post How To Include Information Security In Project Management? February 2, 2021 When the internet and computer systems were getting popular in the 1980s and 1990s, security was not a significant concern....
Blog Post CREST Incident Response Maturity Assessment March 16, 2021 CREST is an international not-for-profit accreditation and certification body that represents and supports the technical information security market. CREST’s mission...
Blog Post Shadow IT: The Risks, How it Gets Exploited, Its Mitigation Steps January 7, 2021 Shadow IT refers to the use of IT applications, software, and hardware without the corporate IT department’s approval and knowledge....
Page Post Ransomware Threat Hunting Services July 9, 2020 Elevate your organization’s cloud security posture from strategy to incident response. As more companies select different SaaS, IaaS and PaaS...