Designing a quality management approach to cybersecurity starts with two sets of security standards, (1) the manufacturer and (2) the...
Month: October 2014
ISMG’s recent Advanced Persistent Threats Survey, sponsored by Palo Alto Networks, reviews the current advanced threat and APT landscape as well...
In mid-July of this year, we noticed yet another legitimate website had been compromised by APT actors and was serving...
Risk assessment should serve as the foundation for any Health Insurance Portability and Accountability Act (HIPAA) security compliance effort, and...