What if your job was to break things repeatedly in order to make them work better? Sounds like the dream of every curious six-year old, but it’s actually an emerging software engineering trend based in the transition from devops to devsecops. It’s designed to test systematic limitations with the goal of improving security and performance […]… Read More
The post Embrace the Chaos: An Emerging Trend in Software Engineering? appeared first on The State of Security.
Cloud computing has transformed the IT industry, as services can now be deployed in a fraction of the time that it used to take. Scalable computing solutions have spawned large cloud computing companies such as Amazon Web Services (AWS), Google Cloud and Microsoft Azure. With a click of a button, personnel can create or reset […]… Read More
The post Forensics in the Cloud: What You Need to Know appeared first on The State of Security.
Gone are the days when being a CISO (or even just ‘the security guy’) was about actual information security or IT security. Even the term IT security is outdated now, as it emphasizes a one-dimensional view of what security is really about. However, I digress… The information security element of CISO is correct, but for […]… Read More
The post Being a CISO Isn’t Just About Information Security – It’s About Building a Stronger Business Strategy appeared first on The State of Security.
Every business leader understands that, when it comes to cybersecurity, the stakes are extraordinarily high. CEOs tend to take notice when they read headlines about yet another big-name company being victimized by a massive data breach or about industry forecasts suggesting that the annual cost of crime losses and damage will hit $6 trillion by […]… Read More
The post CEO Cyber Quiz: What’s Your IT Security IQ? appeared first on The State of Security.
Passwords may not be the favourite piece of your workday, however, I have a theory – if I could share with you the value of a password, and the reality of how simple they can be to create; then passwords may not be the monster you avoid. PASSWORD ARCHITECT When you get that notice “..your […]… Read More
The post The Infamous Password appeared first on The State of Security.
Few would dispute the idea that an effective cybersecurity profile requires candid assessments of potential vulnerabilities. Here’s a closer look at the challenges facing the federal cybersecurity mission and the efforts of state-level agencies. Federal Though the federal government demonstrates an ongoing commitment to ramping up its cybersecurity mission with annual spending in the tens […]… Read More
The post Inside the Government Cybersecurity Landscape: Federal vs. State Level Challenges appeared first on The State of Security.
The League of Legends game and human psychology are two things we don’t often associate with cybersecurity. As an avid gamer, I encountered and observed many parallels between the tactics used to win games like League of Legends and the mentality that guides human behavior in general. Thus, when I began teaching security awareness and […]… Read More
The post What Can League of Legends Teach Us About Cybersecurity? appeared first on The State of Security.
The General Data Protection Regulation (GDPR) came into force in May 2018, and by the letter of the law, virtually every business in the UK needs to comply with it. However, there are still some misconceptions surrounding the law and what it means to organizations. This can lead to difficult situations where mistakes can be […]… Read More
The post Six Myths People Still Believe About GDPR appeared first on The State of Security.
A person recently asked me if it was possible to implement ISO 27001 using a specific project management software product. They used the tool in the past to define project plans and make project reviews. While I told them this is entirely possible, the truth is one can implement ISO 27001 even without a project […]… Read More
The post Establishing Information Security in Project Management appeared first on The State of Security.
Large organizations have always focused on managing risk, but the technological breakthroughs that have enhanced our world in countless ways have also transformed how leading executives engage in enterprise risk management (ERM). The pervasive and ever-expanding threat of cyber crime means that comprehensive strategies for cyber security are now absolutely essential for all organizations. After […]… Read More
The post Why Cyber Security is Key to Enterprise Risk Management for all Organizations appeared first on The State of Security.
As technology advances and the costs of connecting electronic components to the internet decreases, the lower the cost of having an internet connected smart home is. Sensors placed throughout a house and integrated into home appliances can provide homeowners the advantages of monitoring and managing functions of the home remotely. According to Rehman & Manickam […]… Read More
The post The Risk of Credential Stuffing to the Smart Home appeared first on The State of Security.