Home Tags Information Security

Tag: Information Security

Information security, sometimes shortened to InfoSec, is the practice of defending information from unauthorized access, use, disclosure, disruption, modification, perusal, inspection, recording or destruction. It is a general term that can be used regardless of the form the data may take (e.g. electronic, physical).

IT security

Sometimes referred to as computer security, information technology security is information security applied to technology (most often some form of computer system). It is worthwhile to note that a computer does not necessarily mean a home desktop. A computer is any device with a processor and some memory. Such devices can range from non-networked standalone devices as simple as calculators, to networked mobile computing devices such as smartphones and tablet computers. IT security specialists are almost always found in any major enterprise/establishment due to the nature and value of the data within larger businesses. They are responsible for keeping all of the technology within the company secure from malicious cyber attacks that often attempt to breach into critical private information or gain control of the internal systems.

Information assurance

The act of providing trust of the information, that the Confidentiality, Integrity and Availability (CIA) of the information are not violated. E.g., ensuring that data is not lost when critical issues arise. These issues include, but are not limited to: natural disasters, computer/server malfunction, physical theft, or any other instance where data has the potential of being lost. Since most information is stored on computers in our modern era, information assurance is typically dealt with by IT security specialists. A common method of providing information assurance is to have an off-site backup of the data in case one of the mentioned issues arise.

InfinityQS Upholds ISO 9001:2015 & ISO 27001:2013 Certifications

Prestigious certifications demonstrate company’s ability to achieve and maintain an integrated process approach to deliver quality management systems and meet information security standardsInfinityQS® International, Inc. (InfinityQS), the global authority on data-driven manufacturing quality, announced today that it has successfully sustained its certification to the International Organisation for Standardization (ISO) 9001:2015 and ISO 27001:2013 standards. In doing so, the company reaffirms its ability to achieve, maintain, and continuously improve an integrated process approach to deliver quality... Source: RealWire

Logicalis acquires Packet Systems Indonesia to Grow Customer Base and Strengthen...

London, 20 June, 2017 – Logicalis, an international IT solutions and managed services provider, together with Metrodata, a dominant ICT company in Indonesia, today announced it has agreed to acquire Packet Systems Indonesia (PSI), a leading ICT systems integrator and services company. PSI is a Cisco Gold Partner specialising in data centre, collaboration, Service Provider & Enterprise Network, and information security solutions. PSI will be integrated with the existing Indonesian operation, Logicalis Metrodata Indonesia (LMI),... Source: RealWire

Most Organizations Not Satisfied with Threat Intelligence

Information Security Forum survey finds just one quarter of companies surveyed say threat intelligence technology is delivering on its promise.

OneLogin security chief reveals new details of data breach

Two breaches in as many years. Is the trust gone? Alvaro Hoyos, the company's chief information security officer, answered key questions.

Who’s going to dig you out of a security hole when...

Finding a partner – what to check for You may have noticed that information security is something of a big deal these days. Yoursquo;ll also not have missed that the attackersrsquo; capabilities are far ahead of those of us trying to defend our systems against them.…

Defense contractor stored intelligence data in Amazon cloud unprotected

Booz Allen Hamilton engineer posted geospatial intelligence to Amazon S3 bucket.

IISP Launches New Skills Framework for Information Security Professionals

31 May 2017: The not-for-profit, Institute of Information Security Professionals (IISP) has launched a new version of its Skills Framework, which is widely accepted as the de-facto standard for measuring the knowledge, experience and competency of info...

DTA cyber advisory office to follow and implement ASD policy advice

Despite the creation of the Cyber Security Advisory Office, the Australian Signals Directorate will still be tasked with advising government bodies of information security threats.

Quick, better lock down that CISO role. Salaries have apparently hit...

Thanks WannaCrypt... Hey, about our new security budget. Oh, you've cut it Salaries for chief information security officers (CISOs) at leading European firms have hit €1m (£850,000) as the threat of data breaches grows, City AM reports.…

Waah! WannaCry shifts the blame game into high gear

More and more, information security seems to be about finding someone to blame for the latest crisis.

The blame game was in full gear within hours of the WannaCry ransomware outbreak, and even after a few days therersquo;s still a lot of anger to go around. People want heads to roll, but that wonrsquo;t help contain the current damage or spur improvements to minimize the impact of future attacks.The WannaCry ransomware successfully infected so many machines because it crafted the malware to use multiple infection vectors, including traditional phishing, remote desktop protocol (RDP), and a vulnerability in the SMB protocol.
It took advantage of the fact that people donrsquo;t always recognize phishing links, and that many systems arenrsquo;t running the latest versions of applications or the operating system.To read this article in full or to leave a comment, please click here

5 Steps to Maximize the Value of your Security Investments

How a 'security rationalization' process can help CISOs make the most out of their information security infrastructure, and also improve the company bottom line.

DDOS attacks in Q1 2017

Although the first quarter of 2017 was rather quiet compared to the previous reporting period, there were a few interesting developments.

Despite the growing popularity of IoT botnets, Windows-based bots accounted for 59.81% of all attacks. Meanwhile, complex attacks that can only be repelled with sophisticated protection mechanisms are becoming more frequent.