Tag: technology
-
Cybersecurity: Functions (Part 5)
Detect. If you are following Cybersecurity news and trends you are likely recognizing that breaches are becoming numbingly commonplace. As the SEC increases requirements on companies and states scrutinizing businesses’ practices of collecting, retaining, and protecting data the stakes are getting higher. The burden of having intelligible and actionable alerts and network visibility is growing…
-
Cybersecurity: Functions (Part 4)
Protect. This function, protection, is perhaps the most common function associated with cybersecurity. When speaking about the CIA triad, the day-to-day functions, and the purposes of cybersecurity, the first function most people think about is the protection of identities, data, and assets. As we’ve seen in the previous posts about cybersecurity functions, there are many…
-
Cybersecurity: Functions (Part 3)
Under NIST, to know the organization, its risk profile, threats, vulnerabilities, priorities, requirements, and capabilities, we use the function Identify.
-
Cybersecurity: A light in a dark world
Allowing an organization to misuse the terms creates cultural chaos for professionals and auditors.
-
Better writing on the iPad
Technology is meant to make life better. That includes more accessibility and more efficiency. And that is where tablets come in. But tablets, with their high gloss smooth surface and stylus’ with their rubber nibs, just don’t carry the same effect as writing on paper. That is where a unique screen protector is needed. I’ve…