Deployment Kit Videos | SANS Security Awareness
Security awareness videos on more than 30 languages including Russian, at no cost.
https://www.sans.org/security-awareness-training/deployment-kit-videos
Security awareness videos on more than 30 languages including Russian, at no cost.
https://www.sans.org/security-awareness-training/deployment-kit-videos
NISTIR 8323 (Draft), Cybersecurity Profile for the Responsible Use of PNT Services | CSRC
https://csrc.nist.gov/publications/detail/nistir/8323/draft
https://csrc.nist.gov/publications/detail/nistir/8323/draft
CSRC | NIST
NIST Internal or Interagency Report (NISTIR) 8323 (Draft), Cybersecurity Profile for the Responsible Use of Positioning, Navigation…
The national and economic security of the United States (US) is dependent upon the reliable functioning of critical infrastructure. Positioning, Navigation and Timing (PNT) services are widely deployed throughout the critical infrastructure. A disruption…
From Google Cloud Blog: “Improving security, compliance, and governance with cloud-based DLP data discovery” | by Anton Chuvakin | Anton on Security | Oct, 2020 | Medium
https://medium.com/anton-on-security/from-google-cloud-blog-improving-security-compliance-and-governance-with-cloud-based-dlp-data-30b20107d4c1
https://medium.com/anton-on-security/from-google-cloud-blog-improving-security-compliance-and-governance-with-cloud-based-dlp-data-30b20107d4c1
Medium
From Google Cloud Blog: “Improving security, compliance, and governance with cloud-based DLP data discovery”
So, I’ve been doing some blogging at Google Cloud blog with most posts connected to products, launches, etc. However, I am also doing a fun…
As cybercrimes grow in both frequency and severity, EA and security leaders must aid in deeply embedding security into the organization’s architecture. Overcoming organizational barriers between security architecture and IT stakeholders remains a challenge. EA and security leaders need to increasingly present themselves as problem solvers, not friction inducers. For this reason, we position security architecture as yet to reach the Peak of Inflated Expectations. Security architecture in large enterprises with the focus on using it to bring coherence, cost savings and a single vision has been around a long time. However security architecture practices have found themselves adrift in the face of the increased adoption of Agile and CI/CD processes. Therefore, we put the market penetration in the range of 5% to 20%, with the view that the current overall market penetration is closer to 10% and the position at pre-peak 10%.