Information Security

This category contains 686 posts

Encouraging Women in Tech is About a Better Future for All of Us

Why is ISACA’s SheLeadsTech program needed? Why does the 2030 Agenda for Sustainable Development consider the technology gender gap to be an important topic to address, and who must be involved in the solutions? Where are we now? Thematic focus and indicators are useful to understand the current situation. Factors such as access to education and training, Internet usage … Continue reading

Launching of Application Containers and Microservices

The Cloud Security Alliance is launching the Application Containers and Microservices (ACM) Working Group. The CSA ACM Working Group previously work with the National Institute of Standards and Technology (NIST) ACM Working Group to provide research, guidance, and best practices for the secure use of application containers and microservices. CSA is currently looking for volunteers … Continue reading

In the Age of Cybersecurity, Are Data Centers Ignoring Physical Security?

Maintaining a data center is a huge responsibility. While you certainly have systems in place for dealing with cyberthreats, are you giving enough attention to physical security? This is still a very important aspect of the security equation. Five Tips for Keeping Data Centers Secure The objective of physical data center security is pretty straightforward: keep out unauthorized … Continue reading

Four Important Best Practices for Assessing Cloud Vendors

When it comes to evaluating new vendors, it can be challenging to know how best to communicate the requirements of your vendor assessment process and ultimately select the right partner to help your business move forward — while at the same time avoiding the risk of a third-party security incident. After all, 63 percent of data breaches are … Continue reading

Cloud Security Alliance Issues New Code of Conduct for GDPR Compliance

Edinburgh, Scotland – November 21, 2017 – The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining and raising awareness of best practices to help ensure a secure cloud computing environment, today released the CSA Code of Conduct for GDPR Compliance, which provides cloud service providers (CSPs), cloud customers, and potential customers with much-needed guidance in order … Continue reading

Cloud Security Alliance Releases New Cloud Security for Startups Report

SEATTLE, WA – November 20, 2017 – The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining and raising awareness of best practices to help ensure a secure cloud computing environment, today released a new report titled Cloud Security for Startups. The new white paper, developed by the CSA’s Israel chapter, aims to help Software-as-a-Service Startups (SaaS-SUs) … Continue reading

Need of the Hour: An Effective Cyber Security Leader

Cyber risks have taken center stage in the corporate world. It is estimated that more than 80 percent of organizations have now included cyber risk as one of the top five risks in their risk register. Cyber security has become a key concern for boards and executive leadership. Recent surveys and research suggest that although … Continue reading

Five Areas to Consider When Testing Cyber Threat Intelligence Effectiveness

According to the ISACA State of Cyber Security 2017 research, 80% of respondents believe “it is either “likely” or “very likely” that they will be attacked in 2017.” In 2018 and beyond, based on current risk trends to organizations from their infrastructure, employees, supply chain and external threat actors, this figure is unlikely to drop. Cyber threat … Continue reading

Five Mistakes to Avoid When Deploying Emerging Technology

When I finished my proof-of-concept presentation to the CIO of a prospective client at a recent meeting, he was more than surprised – he was upset. He almost yelled at me: “How did you do it?” For my demo, my client had to complete a paper application form used by his company’s sales force. He … Continue reading

Enterprise Leaders Should Steer Organizations on Path to Digital Transformation

Employees are at their best when they are encouraged to take calculated risks, rather than becoming complacent with what they know and what has become comfortable. The same holds true for enterprises. Some of the best risks enterprises can take in our technology-driven business landscape involve deploying transformative technologies that allow them to connect with … Continue reading

Web Stats

  • 126,468 hits


@PhilipHungCao, CISM, CCSP, CCSK, CASP, CIW-WSP, GICSP, PCNSE, ACSP, CCDA, DCSE, JNCIA, MCTS, MCSA, VCP5-DCV, VCP6-NV, ZCNT is a #TekF@rmer. He has 16 years' experience in ICT/Cybersecurity industry in various sectors & positions.

Personal Links

View Full Profile →

Enter your email address to follow this blog and receive notifications of new posts by email.

Join 2,652 other followers

Twitter Updates


January 2018
« Dec