Advanced Search
Search Results
638 total results found
Mainframe
its actually real? A mainframe computer is a large, powerful computer that is capable of processing extremely large amounts of data, usually running proprietary operating systems that are rarely updated.
Securing Embedded Systems
lock them in a white room. Smart devices are popular, but they are a black box. The consumer usually has little ot no control over the technology being used within said smart devices, and vendors are known to be slow with rolling out security updates for thei...
Email Security
who even still uses email anyway Email is cleartext by default. However, S/MIME and PGP are used to secure email. They both use certificates to provide authentication, message integrity, non-repudiation, and privacy. Secure Multipurpose Internet Mail Extensi...
Governance and Accountability
who in tel aviv can i blame for all my problems Governance practices ensure organizations abide by all applicable cybersecurity laws and regulations to protect them from legal liability. Governance oversees: regulatory compliance requirements contractual ...
Data Governance Roles
role-based access control redux Role Description Role Owner A senior (executive) role with ultimate responsibility for maintaining the confidentiality, integrity, and availability of an information asset. A high-ranking employee, li...
Third Party Vendors
just don't get third partied uhhh third parties are sometimes good and sometimes bad. choose the good ones to do business with. Third-Party Relationships (Raw Lesson Content) VendorĀ - A vendor is a company that sells an organization's goods or provides su...
Rules of Engagement
the parameters and expectations for third-party relationships we need to expect a certain level to be met when partnering professionally with professed professionals The Expectations Roles and Responsibilities (who is responsible to do what in this partne...
Vendor Assessment
how do we know which third-party vendors to do business with? uhhh just do a bunch of stuff on them. lowkey experiment on them. Penetration Testing Right to Audit Clause Proof of Internal Audits Independent Assessments Supply Chain Analysis Audits a...