IT Governance Blog: the Statement of Applicability in ISO 27001

IT Governance Blog: the Statement of Applicability in ISO 27001

Documentation is a crucial part of any ISO 27001 implementation project, and one of the most important documents you need to complete is the SoA (Statement of Applicability). In this blog, we explain what an SoA is, why it’s important and how to produce one. What is a Statement of Applicability? An SoA summarises your organisation’s position on each of the 114 information security controls outlined in Annex A of ISO 27001. Clause 6.1.3 of…

Read More

Business resilience: A critical program for organizations to enhance crisis response

Business resilience: A critical program for organizations to enhance crisis response

Business resilience: A critical program for organizations to enhance crisis response | 2021-03-23 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to…

Read More

Defeating password spraying attacks

Defeating password spraying attacks

Defeating password spraying attacks | 2021-03-23 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses CookiesBy…

Read More

Security assurance concept for your business

Security assurance concept for your business

Security assurance concept for your business | 2021-03-23 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website…

Read More

How to integrate automation and controls seamlessly to improve schools

How to integrate automation and controls seamlessly to improve schools

How to integrate automation and controls seamlessly to improve schools | 2021-03-23 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn…

Read More

Your streaming service is fertile ground for bot attacks

Your streaming service is fertile ground for bot attacks

Your streaming service is fertile ground for bot attacks | 2021-03-23 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more….

Read More

How can the trucking industry secure their telematics?

How can the trucking industry secure their telematics?

The trucking sector is essential to countless other industries. Without reliable transportation, supply chains would crumble, and companies and consumers would face shortages. With so much riding on it, it’s no wonder why the industry has fully embraced technology like telematics in recent years. Telematics refers to the suite of technologies fleets use to share data between vehicles and command centers. At its most basic level, it includes things like GPS tracking, and at its…

Read More

6 Cloud Security Resources that You Should Be Using

6 Cloud Security Resources that You Should Be Using

It’s easy to get overwhelmed with the number of cloud security resources available. How do you know which sources to trust? Which ones should inform your security strategies? Which reports will actually improve your cloud security posture? Let’s first look at six cloud security guides that you should be using. These resources provide action items that you can take back to your team and use immediately. Each of these guides are from trusted industry experts…

Read More

The University of Queensland Selects Tenable to Secure World-Leading IP

The University of Queensland Selects Tenable to Secure World-Leading IP

Partnership contributes to cybersecurity scholarship for Aboriginal and Torres Strait Islander students The University of Queensland (UQ), ranked in the top 50 universities globally, has chosen Tenable®, Inc. as its Cyber Exposure solutions provider to see, predict and act to reduce cyber risk across its domestic campuses. The deployment was a result of Tenable’s strategic partnership with Baidam Solutions, an Indigenous-owned, Supply Nation Certified ICT Consultancy.  2020 saw a significant increase in cyberattacks against Australian…

Read More

7 expert tips on recruiting cybersecurity pros

7 expert tips on recruiting cybersecurity pros

HR and recruiting experts offer unique ways to find and hire cybersecurity talent. Image: iStock/iBrave According to the Cybersecurity Workforce Study, 2020 conducted by (ISC)², the global gap in 2020, for the first time ever, decreased from 4 million to 3.1 million, despite the economic challenges presented by COVID-19. Even though more cybersecurity positions are being filled than in previous years, a large gap still exists.  “Several factors are contributing to the talent gap, including how…

Read More
1 2,344 2,345 2,346 2,347 2,348 2,558