SANS DFIR Blog pertaining to a summary of the SANS DFIR SummitRead More A Visual Summary of SANS DFIR Summit 2021
A sneak peek of some of the main themes at Black Hat USA next month.Read More 7 Hot Cyber Threat Trends to Expect at Black Hat
To mitigate the chances of their Wi-Fi home routers being compromised, users would do well to change the manufacturer’s default access credentials
The post Popular Wi‑Fi routers still using default passwords making them susceptible to attacks app…
Who will you call when your organisation has been compromised? Having a cyber incident response team ready to go can save your organisation from disaster. There’s no escaping the threat of cyber security incidents. Criminals are constantly poised to exploit vulnerabilities, and employees use complex IT systems where mistakes are bound to happen. Investing in cyber defences can reduce those risks, but organisations need to be ready for threats they can’t prevent. A CIR (cyber incident response) plan does just that, outlining strategies for identifying and responding to security breaches. An effective plan can quickly stop disruption from turning into
The post How to build a cyber security incident response team (CSIRT) appeared first on IT Governance UK Blog.Read More How to build a cyber security incident response team (CSIRT)
Anyone with an interest in information security will have encountered ISO 27001, the international standard that describes best practice for an ISMS (information security management system). However, you might not be as familiar with ISO 27002. It’s a supplementary standard that provides advice on how to implement the security controls listed in Annex A of ISO 27001. Although ISO 27001 is the more well-known standard – and the one that organisations certify to – neither can be considered in isolation. This blog explains why that’s the case, helping you understand how each standard works and the differences between them. WhatRead More ISO 27001 vs. ISO 27002: What’s the difference?