Poulin: The Economics of IoT Fear and Uncertainty
Information- (and now device-) security is an underappreciated field. It’s anti-climactic and difficult to justify the cost of...
Beaver: Address Security Opportunities or Remain on the Path to Mediocrity
In every organization, there are obstacles and challenges that IT and security professionals have to overcome in order to get their work...
Van Wyk: Don't Just Write Your IR Plans, Test Them
Responding to information security crises is far more than a technical task. It involves close coordination and communication with people...
May 23, 2017 | Incident Response PlanningBy Ondrej Krehel, IANS Faculty
— CLIENT PORTAL —>
Please Login to continue
Poll: What Are the Best Ways to Weed Out Insecure Products and Vendors During Procurement?
IR Playbook: Take the Right Steps After a Firewall Breach
The Equifax Breach: What Happened and What to Do About It
Create Optimal Contract Language to Enable App Security Assessments via the Cloud