Information Security Forum (ISF), a nonprofit association that researches and analyzes security and risk management issues has noted that many CISOs are reporting the wrong…
The e-InnoSec team recently completed a 6-part series to guide organizations with leveraging GDPR preparation for CCPA. The Malware/Ransomware 4-part series is focused on helping…
e-InnoSec team recently completed a 6-part series that guides organizations with leveraging GDPR preparation for CCPA. Here are the links for that series. Part III…
In this blog I am seeking readers participation to build an all-inclusive list of telltale signs of malware infection. The e-InnoSec team recently completed a…
The article “How to protect malware” is a must-read for everyone. Despite all their efforts, many businesses are making the news for ransomware attacks. I…
One of the most important security domains is Access Management. There have been continuous innovations in the field of access authentication: login ID, password, secure…
The e-InnoSec team emphasizes the approach “Do it Right the First-Time.” Despite years of investment corporations feel their NIST program implementation is inadequate, budget intensive,…
In the last few months, we have covered various areas in managing cybersecurity during the pandemic. The last blog “Workplaces Considerations for Reopening During Pandemic”…
The e-InnoSec team recently completed a 6-part series as a guide for organizations to leverage GDPR preparation for CCPA. The Malware/Ransomware 4-part series was focused…
In part I, we discussed the SOAR (Security Orchestration, Automation, and Response) and how it’s different from SIEM. In part II, the e-InnoSec team is…