NIST Framework is a good base to create a security policy. I have discussed NIST Framework at my blogsite (oversitesentry.com) and there are 6 pieces…
Subscribe to continue reading Subscribe to get access to the rest of this post and other subscriber-only content. Type your email… Subscribe Already a subscriber?
My blogpost on this topic at Oversitesentry shows the NIST-80063B publication to note that a long password is better for overall security rather than a…
Do you want to spend money before or after a hacker attacks you? Do you think you are not being attacked because you are too…
What if you could see some examples of real life attacks? What about a phishing email attack? Do you know the parts of an email…
Chatgpt Jan9 version (openai) software wrote an article on PCI4.0 upgrade — edited by tonyz to remove software developer items (many businesses do not develop…
One aspect of risk is the people in the company. In a sample company one has management, sales, production of a product or service (workers),…
Is it sad that we have to not trust others anymore? But it is a necessity for surviving on the Internet these days. Since everything…
Today’s news is typical for Cybersecurity: April Microsoft Patch Tuesday – (the day that Microsoft releases regular patches conveniently released once a month when possible)…
Example #1: March 28, 21 – Sick.codes has the information and chronology of a disturbing vulnerability found in some software. If one looks at the…