Source: www.securityweek.com – Author: Torsten George By supplementing traditional perimeter defense mechanisms with principles of data integrity, identity management, and risk-based prioritization, organizations can reduce their...
Author: Torsten George
Navigating the Digital Frontier in Cybersecurity Awareness Month 2023 – Source: www.securityweek.com
Source: www.securityweek.com – Author: Torsten George This October will mark the 20th anniversary of Cybersecurity Awareness Month, a pivotal initiative launched under the guidance of the...
Automated Security Control Assessment: When Self-Awareness Matters – Source: www.securityweek.com
Source: www.securityweek.com – Author: Torsten George Exploitation of software vulnerabilities by cyber adversaries has dominated headlines the last couple of months (e.g., Ivanti EPMM flaw, Points.com,...
MOVEit: Testing the Limits of Supply Chain Security – Source: www.securityweek.com
Source: www.securityweek.com – Author: Torsten George Since late last month, a Russian cyber-extortion gang has been exploiting a flaw in a widely used software known as...
Today’s Cyber Defense Challenges: Complexity and a False Sense of Security – Source: www.securityweek.com
Source: www.securityweek.com – Author: Torsten George There are quite a few industry standards (e.g., ISO/IEC 27001, PCI DSS 4.0) and government regulations (e.g., HIPAA, FISMA, CISA)...