Information Security Forum (ISF), a nonprofit association that researches and analyzes security and risk management issues has noted that many CISOs are reporting the wrong…
The e-InnoSec team recently completed a 6-part series to guide organizations with leveraging GDPR preparation for CCPA. The Malware/Ransomware 4-part series is focused on helping…
e-InnoSec team recently completed a 6-part series that guides organizations with leveraging GDPR preparation for CCPA. Here are the links for that series. Part III…
In this blog I am seeking readers participation to build an all-inclusive list of telltale signs of malware infection. The e-InnoSec team recently completed a…
The article “How to protect malware” is a must-read for everyone. Despite all their efforts, many businesses are making the news for ransomware attacks. I…
The e-InnoSec team recently completed a 6-part series as a guide for organizations to leverage GDPR preparation for CCPA. The Malware/Ransomware 4-part series was focused…
In part I, we discussed the SOAR (Security Orchestration, Automation, and Response) and how it’s different from SIEM. In part II, the e-InnoSec team is…
In part, we discussed the SOAR (Security Orchestration, Automation, and Response) and how it’s different from SIEM. In part II, we explored SOAR and Threat…
The last posting – Securing Cloud Data Part I – we discussed the security triad in the context of data security which includes data-at-rest encryption…
The last posting – Securing Cloud Data Part I – we discussed the security triad in the context of data security which includes data-at-rest encryption…