Archivi categoria : Utility e Varie

The Core Phases of Incident Response & Remediation

Planning and preparing for unexpected security incidents is perhaps one of the most difficult challenges for security practitioners. With a robust incident response (IR) plan, professionals can follow a foundation or standard for handling incidents. Preparation A security team needs to prepare for a security incident whenever necessary. Preparation is one of the most essential…
Read more

5 Helpful Incident Response Checklists

Once you have a good understanding of the phases of incident response, it’s time to start developing and implementing incident response checklists that are customized for your business. IR checklists can help your security team efficiently respond to incidents by following a systematic process. Preparation Checklist Your incident response checklist for the preparation phase sets the…
Read more

25 Tips for Protecting PII and Sensitive Data

We’re inundated  with requests for our personally identifable information (PII) and even sensitive data yet we sometimes don’t put in the right controls to protect these assets. Organizations are constantly collecting, storing, and distributing PII and sensitive data but many individuals and even organizations still don’t quite understand the repercussions of mishandled data. Here are…
Read more

ADVANCING SOFTWARE SECURITY IN THE EU by ENISA

Secure software development and maintenance is attracting a lot of attention lately, due to the rapidly increased dependency of everyday products, services and process to the underlying software. Quite often, weaknesses behind reported security incidents and/or breaches are being materialized due to the lack of adherence on fundamental security principles and techniques. In order to…
Read more