Archive for the ‘Information Security’ Category

Rite Aid deployed facial recognition system in hundreds of U.S. stores

Rite Aid used facial recognition in largely lower-income, non-white neighborhoods. The systems included one from a firm with links to China and its government Source: Rite Aid deployed facial recognition system in hundreds of U.S. stores Rite Aid facial recognition rollout faces trouble Cyber Espionage Download a Security Risk Assessment Steps paper! Subscribe to DISC […]

Leave a Comment

Twitter stepped up search to fill top security job ahead of hack

Search for a chief information security officer Twitter Inc had stepped up its search for a chief information security officer in recent weeks, two people familiar with the effort told Reuters, before the breach of high-profile accounts on Wednesday raised alarms about the platform’s security. Twitter said hackers had targeted employees with access to its […]

Leave a Comment

Ten Steps to Reduce Your Cyber Risk

Reduce your cyber risk with ISO 27001 Contact DISC InfoSec if you have a question regarding ISO 27001 implementation. Explore the subject of Cyber Attack Download a Security Risk Assessment Steps paper! Subscribe to DISC InfoSec blog by Email Take an awareness quiz to test your basic cybersecurity knowledge DISC InfoSec 🔒 securing the business […]

Leave a Comment

How to uninstall Microsoft Edge forced-installed via Windows Update

If Microsoft Edge was installed in Windows 10 via Windows Update, you can not remove it via standard methods. That does not mean you cannot remove it, though, as a technique has been discovered to uninstall the program via the command prompt. Source: How to uninstall Microsoft Edge forced-installed via Windows Update New Microsoft Edge […]

Leave a Comment

AWS said it mitigated a 2.3 Tbps DDoS attack, the largest ever | ZDNet

The previous record for the largest DDoS attack ever recorded was of 1.7 Tbps, recorded in March 2018. Source: AWS said it mitigated a 2.3 Tbps DDoS attack, the largest ever | ZDNet Was the US hit by a massive ‘DDoS attack’? What is DDOS? Is America Under a Foreign Cyber Attack?! Would like to […]

Leave a Comment

Tech firms suspend use of ‘biased’ facial recognition technology

Amazon, IBM and now Microsoft ban the sale of facial recognition technology to police departments and are urging for federal laws to regulate its use. Source: Tech firms suspend use of ‘biased’ facial recognition technology Download a Security Risk Assessment steps paper! Download a vCISO template Subscribe to DISC InfoSec blog by Email Why Cities […]

Leave a Comment

Deepfakes Are Going To Wreak Havoc On Society. We Are Not Prepared.

In the months and years ahead, deepfakes threaten to grow from an Internet oddity to a widely destructive political and social force. Source: Deepfakes Are Going To Wreak Havoc On Society. We Are Not Prepared. Best Of Deep Fakes Compilation Funniest DeepFakes *Compilation* II. Download a Security Risk Assessment steps paper! Download a vCISO template […]

Leave a Comment

Hackers steal secrets from US nuclear missile contractor

Cyber extortionists have stolen sensitive data from a company which supports the US Minuteman III nuclear deterrent. Source: Hackers steal secrets from US nuclear missile contractor Download a Security Risk Assessment steps paper! Subscribe to DISC InfoSec blog by Email

Leave a Comment

Our latest InfoSec poll results

Please share your thoughts and vote, if poll has not expired yet. Download a Security Risk Assessment steps paper! Subscribe to DISC InfoSec blog by Email

Leave a Comment

State-Based Contact Tracing Apps Could Be a Mess

With no nationwide Covid-19 notification software in sight, security and interoperability issues loom large. Source: State-Based Contact Tracing Apps Could Be a Mess Big Tech’s Contact-Tracing Apps Might Make Things Worse | Mashable Coronavirus outbreak: What are the privacy risks behind ‘contact tracing’ apps? Ebola virus disease contact tracing activities, lessons learned Download a Security […]

Leave a Comment

CyberSecurity for Dummies

CyberSecurity for Dummies Open a PDF file The best practice guide for an effective infoSec function.   Introduction to Cybersecurity What You Should Learn Before Cybersecurity Subscribe to DISC InfoSec blog by Email

Leave a Comment

Preparing a Secure Evolution to 5G

5G CYBERSECURITY Preparing a Secure Evolution to 5G Tech Talk: 5G Security Security of 5G networks: EU Member States complete national risk assessments Bye bye privacy with 5G Subscribe to DISC InfoSec blog by Email

Leave a Comment

Comprehensive open source free tools list

SANS Faculty has a comprehensive open source free tools available to support your information security career, training and research. to download pdf for open source free tools list Open Source Tools For Working Remotely From Home: pfsense, OpenVPN, Syncthing, and Nextcloud Subscribe to DISC InfoSec blog by Email

Leave a Comment

Tokenization vs. Encryption vs. Aliasing – How to Truly Minimize Compliance Risk

  https://en.wikipedia.org/wiki/Tokenization_(data_security) Source: Tokenization vs. Encryption vs. Aliasing – How to Truly Minimize Compliance Risk The tokenization of things | Matthew Roszak | TEDxSanFrancisco Subscribe to DISC InfoSec blog by Email

Leave a Comment

NIST CyberSecurity Framework and ISO 27001

NIST CyberSecurity Framework and ISO 27001 How to get started with the NIST Cybersecurity Framework (CSF) – Includes Preso Written Information Security Program (WISP) – ISO 27002, NIST Cybersecurity Framework & NIST 800-53 What is ISO 27001? Virtual Session: NIST Cybersecurity Framework Explained Enter your email address: Delivered by FeedBurner

Leave a Comment

Five Keys for Building a Security program

https://www.sans.org/media/critical-security-controls/Poster_CIS-Security-Controls_2018.pdf The best practice guide for an effective infoSec function Five Keys for Building a Security program Open a PDF file Five Keys for Building a Security Program.   Enter your email address: Delivered by FeedBurner

Leave a Comment

6 Essential Pillars for InfoSec Prioritization

It may be time to Think Differently in security. Do you know which of your vulnerabilities are critical, those which can wait a day, vs ones that are just noise? Read this handy guide to get the 6 essential pillars for comprehensive InfoSec prioritization: The Five Laws of Cybersecurity | Nick Espinosa | TEDxFondduLac Your […]

Leave a Comment

The best practice guide for an effective infoSec function

The best practice guide for an effective infoSec function: iTnews has put together a bit of advice from various controls including ISO 27k and NIST CSF to guide you through what’s needed to build an effective information security management system (ISMS) within your organization. This comprehensive report is a must-have reference for executives, senior managers […]

Leave a Comment

Live and let live InfoSec

User vs Security Live and let live InfoSec The average person’s take on security control: they have real jobs to do, and security isn’t one of them. so remember ‘usability vs bypass security control’ when designing a new control. Please feel free to share your opinion on this. Funny business meeting illustrating how hard it […]

Leave a Comment

Creating A Cyber Secure Home

Creating A Cyber Secure Home – Infographic via SANS Institute  Subscribe in a reader

Leave a Comment