Remove cyber-risk which-security-metrics-should-i-use-
article thumbnail

Your CVSS Questions Answered

IT Governance

What the Common Vulnerability Scoring System is, how to use it, limitations and alternatives, and key changes in CVSS v4.0 Previously, we’ve interviewed Leon about secure remote working and what the best VPN (virtual private network) solutions are. Who should use the CVSS, and when? will be adopted. will be adopted.

IoT 118
article thumbnail

Q&A: Why emerging IoT platforms require the same leading-edge security as industrial controls

The Last Watchdog

Related: Why the golden age of cyber espionage is upon us. The global cybersecurity community is keenly aware of these developments and earnest discussions are underway about how to deal with the attendant security exposures. The risks are growing for two reasons. Barda: Yes. And what needs to be improved?

IoT 175
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Organisations are struggling to monitor remote employees

IT Governance

I don’t think any of us would have thought in March 2020 that remote working would be as popular as it has become. The scepticism perhaps came from the hurriedness with which the measures were implemented, as many people worked from kitchen tables and between childcare responsibilities. hours for those who never work from home.

GDPR 119
article thumbnail

ISO 27001 checklist – a step-by-step guide to implementation

IT Governance

If you’re considering implementing an ISMS (information security management system) that conforms to ISO 27001 – the international standard for information security management – you may be daunted by the scale of the task. Why should I implement ISO 27001? Risk assessment software. Don’t give up, though.

Risk 75
article thumbnail

The Hacker Mind Podcast: Going Passwordless

ForAllSecure

Passwords are everywhere, but they probably weren't intended to be used as much as they are today. Is there something more secure? Either they’re too weak -- and therefore trivial to guess--, or we reuse them, which means an attacker can use them to gain access to multiple sites. I must have the password.

article thumbnail

To Achieve Zero Trust Security, Trust The Human Element

Thales Cloud Protection & Licensing

To Achieve Zero Trust Security, Trust The Human Element. With more employees working remotely than ever before due to COVID-19, businesses are at greater risk from a cyber-attack with workers accessing systems outside of the usual company network. Here is what they told us. Angus Macrae, Head of Cyber Security.

article thumbnail

Can Enterprises execute a GRC Movement?

Security Affairs

Managed security services or security operations, cloud security, GRC is one of the fastest growing solutions in the world. The only place I can say more risk = more gain would be in the entrepreneurship space…because in the enterprise cyber security kingdom, it is just the opposite! Ref: [link].