The Business Case for Information Security: Getting Your Security Budget Approved

Counter Crime Agencies Investigate Distributed Denial of Service Attacks

Counter crime agencies in United States (US), United Kingdom (UK) and other European countries have initiated investigation into a series of distributed denial of service (DDoS) attacks that disrupted websites of Amazon, PayPal, MasterCard, VISA and PostFinance and several others . The attacks were launched by hacktivists supporting WikiLeaks in response to suspension of services…

5 Significant Cyber Security Risks Businesses Should Ponder

ISO 27001 – The Information Security Standard – Managing Risks, Application and Benefits

ISO 27001 is designed to help businesses to protect their information assets. One of the ISO management system standards, ISO 27001 provides benchmarks for the management of information security in any kind of organization. It provides a sound and integrated structure for an Information Security Management System (ISMS) allowing the organization to better manage their…

Artificial Intelligence and Machine Learning Basics

Federal Cyber ​​Security and Trusting the Cloud – Data Hosting and Virtualization

It seems that the security risk to federal cyber security introduced by a new or emerging technology is inversely proportional to the convenience it offers to industry. Every few years a hot capability comes along that instantly has businesses clamoring to adopt it, while security professionals scramble to discover and address its vulnerabilities. Wireless networking…