Feb 28 2019

Microsoft: Do these things now to protect your network | ZDNet

Category: Information SecurityDISC @ 10:08 am


In its annual security intelligence report, Microsoft offers up its top tips for blocking out hackers.

Source: Microsoft: Do these things now to protect your network | ZDNet


Enter your email address:

Delivered by FeedBurner


Jan 29 2019

Scanner CLI : A Project Security/Vulnerability/Risk Scanning Tool

Category: Information SecurityDISC @ 8:38 am

  • #InfoSecTools
  • The Hawkeye Scanner CLI is a project security, vulnerability and general risk highlighting tool. It is meant to be integrated into your pre-commit hooks

    Source: Scanner CLI : A Project Security/Vulnerability/Risk Scanning Tool



    Jan 25 2019

    Windows 7 migration warning: Plan now to avoid security worries later | ZDNet

    Category: Information SecurityDISC @ 9:56 am

    Malware can spread much more easily on obsolete platforms, warns security body. With less than a year until the end of Windows 7 support, don’t get caught out.

    Source: Windows 7 migration warning: Plan now to avoid security worries later | ZDNet

    Subscribe to DISC InfoSec blog by Email


    Tags: Windows 7, windows security


    Jan 23 2019

    Center for Internet Security releases Microsoft 365 benchmarks

    Category: App Security,Information SecurityDISC @ 11:01 am

    Follow the guidance in this CIS document to configure Microsoft 365 security settings to the level that suits your organization.

    Source: Center for Internet Security releases Microsoft 365 benchmarks



    Jan 22 2019

    Businesses can safely delay patching most vulnerabilities

    Category: Information Security,Security patchingDISC @ 8:38 am

    Patching vulnerabilities is often seen as a key element of keeping systems secure. But a new report suggests businesses could be ā€˜smarter’ in their patching regimes and prioritize the i…

    Source: Businesses can safely delay patching most vulnerabilities

    🔒 securing the business 🔒

    DISC InfoSec

     



    Sep 19 2018

    US lawmakers introduce bill to fight cybersecurity workforce shortage

    Category: cyber security,Information SecurityDISC @ 10:04 am

    Report claims US public and private sectors had over 300,000 cybersecurity-related job openings between April 2017 and March 2018.

    ByĀ Catalin CimpanuĀ forĀ Zero Day

    softwarearchitect.jpg

    US lawmakers have introduced a bipartisan bill in the House of Representatives meant to address the cybersecurity workforce shortage crisis.

    The bill, named theĀ Cyber Ready Workforce ActĀ (H.R.6791), would establish a grant program within the Department of Labor.

    According to the bill’s proposed text, the Secretary of Labor will be able to award grants to workforce intermediaries to support the creation, implementation, and expansion of apprenticeship programs in cybersecurity.

    These apprenticeship programs may include career counseling, mentorship, and assistance with transportation, housing, and child care costs.

    The Cyber Ready Workforce Act is meant to address a growing problem in the US workforce landscape where companies, across all sectors, are having a hard time filling cybersecurity jobs with trained personnel.

    According to aĀ CompTIA reportĀ based on data from CyberSeek, a free cybersecurity career and workforce resource, there were 301,873 cybersecurity-related job openings in the private and public sectors between April 2017 and March 2018.

    Also:Ā Bill that would have the White House create a database of APT groups passes House vote

    Congresswoman Jacky Rosen (Dem., NV-03) introduced the bill last week. The bill is based on the state of Nevada’s recently introducedĀ cybersecurity apprenticeship program.

    The bill was also co-sponsored by Congressman Seth Moulton (Dem., MA-06), Congresswoman Elise Stefanik (Rep., NY-21), and Congressman Dan Donovan (Rep., NY-11).

    The bill, which doesn’t yet have mirroring legislation in the Senate, has also gained the support of trade and workforce organizations such as CompTIA and The Learning Center.

    Cybersecurity threats will continue to present national security challenges for America in the 21st century,” said Congressman Dan Donovan. “With these threats and the changing economic and technological landscape, America needs a workforce that can adequately advance our cybersecurity defense priorities.”

    “Investing in and expanding our cybersecurity workforce doesn’t only fuel our economy, it keeps us safe,” said Congressman Seth Moulton. “While I was fighting on the ground in Iraq, Al-Qaeda was fighting us on the internet — and they were beating us online! And while we focused on Russia’s military in 2016, they attacked us through the internet. This bill is an important first step towards making sure we don’t get ourselves into such a vulnerable position again.”


    Tags: cybersecurity workforce shortage


    Nov 19 2017

    4 reasons you should get a cyber security qualification

    Category: CISSP,cyber security,Information SecurityDISC @ 7:10 pm

    The dramatic rise in cyber attacks over the past few years has caught most businesses off guard. Their cyber security departments are severely understaffed, causing them to look desperately for qualified professionals to help tackle the threat.

    There has never been a better time to get into cyber security, so if you’re looking to enter the field, or further your career in it, you could benefit massively from gaining a relevant qualification. Here are four reasons why:

    1. Cyber security professionals are well paid

    Money isn’t everything when it comes to choosing your career, but it’s obviously a big factor for many people. We mentioned recently that people with aĀ CISMĀ®,Ā PCIorĀ GDPRĀ qualification could earn Ā£60,000 or more a year.

    Of these, the CISM (Certified Information Security Manager) qualification is the most versatile. It’s the globally accepted standard of achievement among information security, information systems audit and IT governance professionals.

    According to ITJobsWatch, people with a CISM qualification earn £64,000 a year on average. This figure has grown by more than 9% in the past two years.

    1. There’s a high level of job security

    The shortage of qualified cyber security professionals means that those in the field are less likely to be replaced or made redundant. Their skills are hard to find elsewhere, and the more someone gets to know the company, the more valuable they will become.

    Additionally, because almost every organisation currently needs cyber security professionals, those with the relevant qualifications are more likely to find a position in a location or company that suits them.

    1. There’s room for career growth

    For the same reason that cyber security is a safe career, it’s also one that offers plenty of room for growth. Qualifications plus experience is a powerful combination that can help you move into more senior positions.

    As you gain experience, you’ll also get the opportunity to earn more advanced qualifications. For example, you must have at least three years’ experience in IT governance to be eligible for aĀ Certified in Risk and Information Systems Control (CRISCā„¢) qualification, and five years’ experience to be eligible for aĀ Certified in the Governance of Enterprise IT (CGEITĀ®) qualification.

    1. The work is rewarding

    Cyber security is still a relatively young field, making it an exciting and prosperous place. The threats that organisations face are constantly evolving, so you’ll always have new challenges. Plus, you know that your hard work is for a good cause: to stop cyber criminals and keep your organisation safe.

    What qualifications do I need?

    The qualifications you need will depend on the career path you choose. If you’re interested in governance, risk management, and compliance, for instance, a CGEIT qualification is essential. If you’re interested in information security, you’ll need a CRISC qualification.

    We’re currently running promotions on our CRISC, CGEIT, CISA and CISM training courses. If you book before 22 December, you’ll receive a 10% discount on the courses and a 5% discount on all reading materials.

    Find out more about our:




    Nov 12 2017

    Security in the Digital World

    Category: Information SecurityDISC @ 10:39 am

    Cyberspace, the Internet, the digital world – call it what you will – is always developing. But so are the threats and risks that come with it.

    It doesn’t matter if you are working in the most mature enterprise environment, unemployed, retired, or still at school, whether you often have a smartphone in your hand or only use an e-reader: You are still at risk and the threats will try to target you.

    Protect yourself from increasing cyber threats and risks with our latest title,Ā Security in the Digital World, now available to pre-order.

    Security in the Digital World

    This must-have guide features simple explanations, examples, and advice to help you be security aware online in the digital age. Learn how to:

    • Keep your information secure
    • Put the necessary controls on your home network, protecting your family from cyber crime
    • Prevent identity theft when shopping online or using contactless debit cards
    • Keep your children safe when using the Internet

    Look inside this book >>



    Sep 04 2017

    Information Security Certifications and Salaries

    Category: CISSP,Information Security,Security ProfessionalDISC @ 2:54 pm

    Is this a good time to be in the field of InfoSec,Ā (ISC)2 report shows the skills shortage is getting worse.

     

    Over the next five years, the number of unfilled cybersecurity jobs will rise to a whopping 1.8 million, a 20% increase from 2015 estimates, according to a new (ISC)2 survey released.Ā Cybersecurity Faces 1.8 Million Worker Shortfall By 2022

     

    Start learning InfoSec basic:

    When planning to take on this career, at early stage of this career you may get as much practical experience as possible and achieve industry-standard qualifications offered by such asĀ Microsoft, CISCO, Checkpoint, Symantec and HP. AlsoĀ vendor-independent learning path A+, Network+, and Security+ qualifications are recommended.

    When evaluating prospective InfoSec candidates, employers frequently look to certification as one of the measure of excellence in continuing education and commitment to learning. Below are the 7 most sought out InfoSec certifications.

     

    InfoSec Salaries review:

    Security Analyst Salaries in the United States
    Information Security Analyst Salary Range
    IT Security Certifications Salary Guide
    Top Cyber Security Salaries In U.S. Metros Hit $380,000

     



    Aug 10 2017

    Security Management and Governance

    Category: GRC,Information Security,ISO 27kDISC @ 9:38 am
    • The textbook for the Open University’s postgraduate information security course.
    • The recommended textbook for all IBITGQ ISO 27001 courses.
    • Available in softcover or eBook format.



    Description

    Fully updated expert information security management and governance guidance based on the international standard for information security management, ISO 27001.

    As global threats to information security increase in frequency and severity, and organisations of all sizes, types and sectors face increased exposure to fast-evolving cyber threats, there has never been a greater need for robust information security management systems.

    Now in its sixth edition, the bestsellingĀ IT Governance: An International Guide to Data Security and ISO27001/ISO27002Ā provides best-practice guidance for technical and non-technical managers looking to enhance their information security management systems and protect themselves against information security threats.

    This new edition ofĀ IT Governance: An International Guide to Data Security and ISO27001/ISO27002Ā has been fully updated to take account of current cyber security trends and advanced persistent threats, and reflects the latest regulatory and technological developments, including the 2013 updates to ISO 27001 and ISO 27002.

    Product overview

    Including coverage of key international markets, such as the UK, North America, the EU and the Asia-Pacific region,Ā IT Governance: An International Guide to Data Security and ISO27001/ISO27002Ā is the definitive guide to implementing an effective information security management system (ISMS), as set out in the international standard ISO 27001.

    It covers all aspects of data protection/information security, including viruses, hackers, online fraud, privacy regulations, computer misuse and investigatory powers.

    Changes introduced in this edition include:

    • Full updates in line with the 2013 revisions to the ISO 27001 standard and ISO 27002 code of practice.
    • Full coverage of changes to data protection regulations in different jurisdictions and advice on compliance.
    • Guidance on the new continual improvement model that replaces the plan-do-check-act cycle that was mandated in the 2005 iteration of ISO 27001.
    • New developments in cyber risk and mitigation practices.
    • The latest technological developments that affect IT governance and security.
    • Guidance on the new information security risk assessment process.

    IT Governance: An International Guide to Data Security and ISO27001/ISO27002Ā is the recommended textbook for the Open University’s postgraduate information security course and the recommended text for all IBITGQ ISO 27001 courses.



    Apr 12 2017

    Top rated InfoSec books to broaden your horizon

    Category: Information SecurityDISC @ 1:20 pm

    There are plenty of good books out there, feel free to share your favorite InfoSec books in the comment section

    If you think technology can solve your security problems, then you don’t understand the problems and you don’t understand the technology.  – Bruce Schneier

    Explore vast selection of Information Security Books

    Tags: InfoSec books, Security books


    Jan 09 2017

    The new CISO role: The softer side

    Category: Information Security,ISO 27kDISC @ 12:17 pm

     

    English: Risk mitigation action points

    English: Risk mitigation action points (Photo credit: Wikipedia)

    ByĀ Tracy Shumaker

    In order for CISOs to stay relevant in their field today, they must add communication and soft skills to their list of capabilities. Traditionally, their role has been to take charge of IT security. Now CISOs oversee cybersecurity and risk management systems. They must manage teams and get leadership approval in order to successfully implement a system that aligns with overall business goals.

    Speak in a common business language

    The CISO will need to appoint both technical and non-technical individuals to support a risk management system, which requires communication in a language that everyone can relate to. Additionally, senior executives’ approval is required and this will involve presenting proposals in non-technical terms.
    Being able to communicate and having the soft skills to manage people is a challenge CISOs face. For CISOs to reach a larger audience, they need to clearly explain technical terms and acronyms that are second nature and translate the cybersecurity risks to the organization into simple business vocabulary.

    Get the tools to gain the skills

    IT Governance Publishing books are written in a business language that is easy to understand even for the non-technical person. Our books and guides can help you develop the softer skills needed to communicate in order to successfully execute any cybersecurity or risk management system.

    Develop your soft skills with these books >>

    Discover the best-practice cyber risk management system, ISO 27001

    This international standard sets out a best-practice approach to cyber risk management that can be adopted by all organizations. Encompassing people, processes, and technology, ISO 27001’s enterprise-wide approach to cybersecurity is tailored to the outcomes of regular risk assessments so that organizations can mitigate the cyber risks they face in the most cost-effective and efficient way.

    Find more information about ISO 27001 here >>

    Top Rated CISO Books


    Apr 26 2016

    Information Security Expertise Bundle

    Category: Information SecurityDISC @ 11:47 am

    InfoSecBundle

    If you’re just starting a new job in information security, you’ve just finished your university degree, or you’re looking for the next step in your career but not sure which direction to take, try this…

    Information Security Expertise Bundle

    Designed to help you develop your knowledge and understanding of key information security topics, this collection of best-selling titles will help you learn more about open source intelligence techniques, penetration testing, information security best practices, and how to succeed in the industry.

    The bundle includes:

    • Information Security – A Practical Guide
    • The Tao of Open Source Intelligence
    • The Security Consultant’s Handbook
    • Penetration Testing: Protecting Networks and Systems

    »» Buy now Information Security Expertise Bundle




    Mar 23 2016

    25 Years of Information Security

    Category: Information SecurityDISC @ 12:57 pm

    Opening theme video from RSA Conference 2016 – #RSA2016

    Observations from the 2016 RSA Conference



    Tags: Cryptography, RSA Security


    Mar 07 2016

    RSA 2016 feature presentations and keynotes

    Category: Information SecurityDISC @ 4:38 pm

    RSA2016

    Excellence in the Field of Mathematics

    The Cryptographers’ Panel

    Crypto 101: Encryption, Codebreaking, SSL and Bitcoin

    Beyond Encryption: Why We Can’t Come Together on Security and Privacy

    Peek into the Future: Symantec

    Ascending the Path to Better Security: Cisco

    Louder Than Words: Intel Security

    Trust in the Cloud in Tumultuous Times: Microsoft

    The (Inevitable?) Decline of the Digital Age: Palo Alto

    The Sleeper Awakes: RSA

    Turning the Tables: HP

    The Power of Storytelling: StoryCorps

    Sean Penn at RSA2016




    Feb 24 2016

    How should an organization deal with #ransomware?

    Category: Information Security,MalwareDISC @ 2:31 pm

    ransomware-image

    by Stephen Northcutt

    A question came up on the GIAC Advisory Board: “How should an organization deal with ransomware?”

    One of the members, Alan Waggoner, gave a good answer. All posts to that mailing list are private, so this is reposted with his permission.

    1. Get reliable, tested backups of everything that is important.
    2. Talk to the managers about their risk acceptance. They probably don’t realize what the potential damage and loss productivity, data, and revenue they are facing. Point out downtime and cost to recover.
    3. White-listing applications like Bit9/Carbon Black won’t be effective in an environment where any user can install any software they want.
    4. Limited administrative access on local computers is excellent for most malware, but ransom-ware tends to run as the local user and doesn’t require elevated privileges.
    5. Centralize management of your endpoint AV so you would get real time notification of malware detection. However, don’t count on it because it would be signature based and relatively easy to bypass.
    6. Segment the network and data as much as possible. Focus of accounting and payroll. Those departments should not have a need for local admin rights or installing random software.
    7. End user security awareness training should be mandatory, with periodic phishing tests.

    8. Set up gateway based email filtering (block dangerous extensions) and web content/malware filtering.

    There is a lot more to do, but the above list should be enough to keep you busy for the foreseeable future and put you and your company on a better path than they are on now.



    Dec 31 2015

    10 Bestselling InfoSec eBooks of 2015

    Category: Information SecurityDISC @ 5:41 pm

    ITGP

    The top titles your peers have been reading this year

    IT Governance Publishing (ITGP) publishes industry-leading titles on all aspects of IT governance, risk management, and compliance.

    ITGP 2015 bestsellers will give you the knowledge you need to transform your working life in 2016. Browse through top 10 below:

     

    1) Web Application Security is a Stack
    Understand the threat from web application attacks and learn how to defend your organization.

    2) Two-Factor Authentication
    Gain a comprehensive evaluation of popular secondary authentication methods.

    3) Directing the Agile Organisation
    Learn how to improve business adaptability, staff engagement, and quality for the benefit of your customers.

    4) Running IT Like a Business
    Learn the secrets of an award-winning IT function with this real-life IT transformation case study, authored by Accenture’s former COO.

    ā€œVery innovative and ground breaking, this is an excellent book.ā€

    Jeffrey D. Klauer

    5) ISO27001/ISO27002 – A Pocket Guide
    Packed with practical advice, this indispensable pocket guide provides a useful overview of two important information security standards.

    6) Agile Governance and Audit
    Discover how to dramatically improve communication between the auditor and the Agile team, improving audit and project outcomes.

    ā€œSo far this book is paying handsomely and it is making me look good already at my new job. Thanks Chris!ā€

    Airplus

    7) An Introduction to Information Security and ISO27001:2013 – A Pocket Guide
    The perfect introduction to the principles of information security management and ISO 27001:2013.

    8) Nine Steps to Success – An ISO27001:2013 Implementation Overview
    Learn the six secrets and nine steps that significantly increase your chances of getting ISO 27001 registered first time.

    ā€œIt’s like having a $300/hr consultant at your elbowā€¦ā€

    Thomas F. Witwicki

    9) ITIL Lifecycle Essentials
    An official ITIL-licensed product, this book covers the entry-level ITIL Foundation syllabus and gives you a solid grounding in the key elements, concepts, and terminology used in the ITIL service lifecycle.

    10) In Hindsight – A compendium of Business Continuity case studies
    Learn from real life how and why to avoid business continuity disasters.

    ā€œā€¦an interesting, thought provoking and stimulating collection of studiesā€

    Philip

    Available in:
    Softcover – Adobe eBook – ePub – Kindle



    Dec 21 2015

    Assessing Information Security

    Category: Information Security,Security Risk AssessmentDISC @ 2:07 pm

    AssessingInfoSec Assessing Information Security – Strategies, Tactics, Logic and Framework draws on the work of Clausewitz and Sun Tzu, and applies it to the understanding of information security that the authors have built up through their extensive experience in the field. The result is expert guidance on information security, underpinned by a profound understanding of human conflict.

    Assessing Information Security – Strategies, Tactics, Logic and Framework, Second edition
    • Shows how to use principles of military strategy to defend against cyber attacks, enabling organizations to have a more structured response to malicious intrusions.
    • Explains the priorities for robust cybersecurity , helping readers to decide which security measures will be the most effective.
    • Buy today and discover how to integrate cybersecurity into your organization’s normal operations.

    Building on the success of the first edition, this new edition covers the most recent developments in the threat landscape and the best-practice advice available in the latest version of ISO 27001.

    ā€œGives you new practical perspective and new way how to think about infosec, many views nicely packed in one book.ā€ Ivan Kopacik

    Building on the success of the first edition, this new edition covers the most recent developments in the threat landscape and the best-practice advice available in the latest version of ISO 27001:2103.

     

    Product overview:

    1. Information Security Auditing and Strategy

    2. Security Auditing, Governance, Policies and Compliance

    3. Security Assessments Classification

    4. Advanced Pre-Assessment Planning

    5. Security Audit Strategies and Tactics

    6. Synthetic Evaluation of Risks

    7. Presenting the Outcome and Follow-Up Acts

    8. Reviewing Security Assessment Failures and Auditor Management Strategies

    Available in: Softcover, Adobe eBook, ePub, Kindle Ā  Ā  Ā  Ā  Ā  Ā  Ā ===>>> Ā Buy now Ā 

    Buy today and discover how to integrate cyber security into your organisation’s everyday operations >>



    Aug 07 2015

    CyberSecurity read which belong on every bookshelf

    Category: Cybercrime,Information SecurityDISC @ 8:37 pm

    by zdnet.com

    Take a plunge into the world of CyberSecurity with these recommended reads:

    1) CountDown to Zero Day

    2) Ghost in the Wires

    3) Secrets and Lies

    4) Spam Nation

    5) The Art of Deception

    6) Data and Goliath

    7) Future Crimes

    8) The Artocity Archives

    artocity
    The Artocity Archives



    Jul 21 2015

    Information Security – A Practical Guide: one of the most ā€˜impressive’ books from ITGP

    Category: Information SecurityDISC @ 8:30 am

    by

    Information Security A Practical Guide

    Corporate information security is often hindered by a lack of adequate communication between the security team and the rest of the organization. Many consider information security an obstacle to reaching business goals, and view security professionals with suspicion if not outright hostility.

    Information Security A Practical Guide
    As a security professional, how can you get broader buy-in from your colleagues?

    Mark Rowe, Editor at Professional Security Magazine, has reviewed one of ITGP’s information security titles which aims to address this issue, Information Security – A Practical Guide: Bridging the gap between IT and management.

    One of the most impressive books from IT Governance Publishing.

    Quick and dirty does it: we’ve reviewed several books on information and IT security published by IT Governance. The latest is one of the most impressive.

    Tom Mooney begins this neat little book by recalling that he was struck when starting his career in information security how little he engaged with non-infosec people. IT would shy away from speaking to him, ā€˜as they feared security would stick its nose in’, and the business viewed security as a ā€˜dark art’. He likens security to brakes on a car: you would hardly drive a car without any, but you only use them when you have to, as a control. Without them, you will have an accident. As the book’s subtitle suggests, infosec is about ā€˜Bridging the gap between IT and management’.

    Like many books, this would have been half as good if it had been twice as long. As it is, Mooney has provided non-security and indeed security people with a very high ratio of good sense that’s worthwhile to read.

    ā€œOffers more than the title suggestsā€

    We’ve known for a while that it’s wisest to do computer security and physical security. In the old days, someone could walk out of a building with your server; now we have the Cloud, people can steal data even more simply, as Edward Snowden and others have. For a dozen years or more, that truth has been reflected in the British Standard for information security management, 27001, that covers the IT and physical sides. Books telling you how to do the two equally well have been hard to find; either the author is a tech guy, lacking know-how of electronic and personnel security; or the other way round. Information Security – A Practical Guide, by Tom Mooney, offers more than the title suggests.

    It’s a short book, of ten chapters each of about ten pages each – and that’s something of merit, given how busy the likely reader is likely to be. I would suggest the reader who can learn from this is either the physical security and guarding person who wants to gen up on infosec, or an IT guy who likewise wants to tighten up security. Mooney keeps it plain and simple, in style and content, and again that is a compliment. A middle chapter, ā€œQuick and dirty risk assessmentsā€ as the title suggests takes you through how to do a risk assessment, and as important to keep doing them. Besides the nuts and bolts of the work, Mooney arguably does us more of a service in the chapters such as ā€œgetting buy-in from your peersā€ because as in so many other parts of the workplace, it’s no good doing a decent or even excellent job if your non-security staff aren’t doing their bit, or aren’t funding it. ā€œOften security is seen as a blocker or necessary evil at the end (some organizations are better than others.ā€ Mooney advises building relationships; letting people know that their input is valued, and that they can help steer security. If you find yourself working for a place that doesn’t have a high regard for security, using some ā€œfear, uncertainty and doubtā€ stories is a start, he suggests. Choose stories from the media, and again he advises explaining yourself in plain and simple English.

    ā€œRecommendedā€

    One observation rather than a criticism is that the author ought to have gone into more detail – but then he would not have written such a concise book. In fairness, he does introduce you to the necessary basics, such as the Senior Information Risk Owner (SIRO), a role often found in UK Government. Instead, Mooney points you in the right direction on such topics as penetration testing (again, with a physical and IT component) and information security policy; first knowing what the ā€˜risk appetite’ of your business is. While Mooney is writing for the information security professional, such is the spread of IT in the office and organization, this book can apply to anyone in security management. This book is well worth an hour of your time, whether as a refresher, or if you are finding yourself facing more work on the info security side. Recommended.

    Reviewed by Mark Rowe, Editor at Professional Security Magazine

    Information Security A Practical Guide
    Covering everything from your first day at work as an information security professional to developing and implementing enterprise-wide information security processes, this book explains the basics of information security, and how to explain them to management and others so that security risks can be appropriately addressed.

    Buy Information Security – A Practical Guide now >>

    Tags: information security guide


    « Previous PageNext Page »