Less than half of the industrial control system common vulnerabilities and exposures reported so far this year need to be prioritized, according to new...
Category - Security
About a decade ago, magnetic tape storage for backup started falling out of fashion. Disk-based backups became all the rage because of their ability to...
By
Cryptography is the art of encrypting and decrypting data. Encryption is the process of encoding unencrypted data,…
or plaintext, into encrypted...
What is an insider threat?
An insider threat is a category of risk posed by those who have access to an organization’s physical or digital assets. These...
By
Data security policies are often confused with information security policies. The latter typically focuses on all aspects of information security...
What is data compliance?
Data compliance is a process that identifies the applicable governance for data protection, security, storage and other activities and...
What is the Information Technology Amendment Act 2008 (IT Act 2008)?
The Information Technology Amendment Act 2008 (IT Act 2008) is a substantial addition to...
What is user behavior analytics (UBA)?
User behavior analytics (UBA) is the tracking, collecting and assessing of user data and activities using monitoring...
IT security terminology and acronyms are bandied about at a furious rate — so much so that the use of several terms throughout the course of a...
Listen to this podcast
This podcast episode discusses ransomware in 2022, including an apparent decrease in attacks, the evolution of cybercrime operations...