The 4th Industrial RevolutionEffective methods for discovering and innovating require addressing current opportunities and challenges. Spence Silver, credited with…Apr 7, 20231Apr 7, 20231
ISO 27001: A quick lookIn an organization, commitment and clearly defined organizational roles are essential elements for successful information security…Apr 7, 2023Apr 7, 2023
UK IASME Governance Standard for Information and Cyber SecurityThe interrogatives and performance measures pertaining to each item within the UK IASME Governance Standard for Information and Cyber…Apr 7, 2023Apr 7, 2023
Australian Signals Directorate (ASD) Essential EightThe Australian Signals Directorate (ASD) Essential Eight comprises a comprehensive set of customizable strategies that are capable of being…Apr 7, 2023Apr 7, 2023
Cybersecurity and Cyber ResiliencyAdvanced Persistent Threats (APTs) are sophisticated cyber threats that pose a significant risk to various systems. APTs are typically…Apr 3, 2023Apr 3, 2023
Changes made to NIST SP 800–53 (rv 5)NIST SP 800–53 documents security and privacy controls that various organizations can implement to defend themselves, their assets, and…Apr 3, 2023Apr 3, 2023
Risk Management Framework (RMF)In order to comprehend the select step in the Risk Management Framework (RMF), one must first distinguish between privacy control and…Apr 3, 2023Apr 3, 2023
Crown Jewel AnalysisThe Crown Jewel Analysis (CJA), alternatively known as Mission-Based Critical Information Technology (IT) Asset Identification, is a…Apr 3, 2023Apr 3, 2023
Security Categorization and NIST FIPS PUB 199The organization and categorization of various cyber assets is a fundamental step in any risk management framework. There are various…Apr 3, 2023Apr 3, 2023
NIST: SP 800–39 and SP 800–37 r2The National Institute of Standards and Technology (NIST) provides guidance on Cyber Risk Management (CRM) to the federal government…Apr 3, 2023Apr 3, 2023