Home Tags Information Security

Tag: Information Security

Information security, sometimes shortened to InfoSec, is the practice of defending information from unauthorized access, use, disclosure, disruption, modification, perusal, inspection, recording or destruction. It is a general term that can be used regardless of the form the data may take (e.g. electronic, physical).

IT security

Sometimes referred to as computer security, information technology security is information security applied to technology (most often some form of computer system). It is worthwhile to note that a computer does not necessarily mean a home desktop. A computer is any device with a processor and some memory. Such devices can range from non-networked standalone devices as simple as calculators, to networked mobile computing devices such as smartphones and tablet computers. IT security specialists are almost always found in any major enterprise/establishment due to the nature and value of the data within larger businesses. They are responsible for keeping all of the technology within the company secure from malicious cyber attacks that often attempt to breach into critical private information or gain control of the internal systems.

Information assurance

The act of providing trust of the information, that the Confidentiality, Integrity and Availability (CIA) of the information are not violated. E.g., ensuring that data is not lost when critical issues arise. These issues include, but are not limited to: natural disasters, computer/server malfunction, physical theft, or any other instance where data has the potential of being lost. Since most information is stored on computers in our modern era, information assurance is typically dealt with by IT security specialists. A common method of providing information assurance is to have an off-site backup of the data in case one of the mentioned issues arise.

BlackBerry readies a more secure version of the Samsung Galaxy S7

Secusmart, the BlackBerry subsidiary that secures the German Chancellor Angela Merkel’s smartphone, will roll out a version of its SecuSuite security software compatible with...

IT security breaches: Why users shouldn’t take all the blame anymore

Information security professionals need to get beyond 'blaming the user' says expert.

MyLife Digital celebrates ISO 27001 certification

MyLife Digital is delighted to announce its successful certification for the ISO 27001 information security standard.Audited by LRQA, MyLife Digital ran various early initiatives...

Brazilian government to create national information security policy

The first steps towards developing a common set of security guidelines for the public sector are being taken

Dissecting Malware

Four-day course on reverse engineering There are just a handful of reverse engineers clustered at the very top of the information security profession.From March 30...

Breaking The Weakest Link Of The Strongest Chain

Around July last year, more than a 100 Israeli servicemen were hit by a cunning threat actor.The attack compromised their devices and exfiltrated data...

The three groups of “security threats”

There are many threats to information security, however the consist weak point is and always will be "people".

​ANZ scores Turnbull’s security assistant as new CISO

Australia's First Assistant Secretary Information Sharing and Intelligence Lynwen Connick will leave the federal government to join ANZ as the bank's new chief information...

Secrecy mounts over White House cybersecurity staff shakeup

The Obama-appointed chief information security officer was charged with keeping staff working closely with the President safe from cyber-threats posed by hackers and nation-state...

Secrecy surrounds White House cybersecurity staff shakeup

The Obama-appointed chief information security officer was charged with keeping the president and his staff safe from cyber-threats posed by hackers and nation-state attackers.

Talking Cybersecurity From A Risk Management Point of View

CenturyLink CSO David Mahon reflects on the evolution of the chief information security officer and why today's CISOs are increasingly adopting a risk-based approach...

Managing compliance is easier in the cloud

Cloud doubters often raise compliance requirements as a barrier to cloud adoption, but in fact cloud providers have many tools to ease compliance with...