Planning and preparing for unexpected security incidents is perhaps one of the most difficult challenges for security practitioners. With a robust incident response (IR) plan, professionals can follow a foundation or standard for handling incidents. Preparation A security team needs to prepare for a security incident whenever necessary. Preparation is one of the most essential…
Read more
5 Helpful Incident Response Checklists
Once you have a good understanding of the phases of incident response, it’s time to start developing and implementing incident response checklists that are customized for your business. IR checklists can help your security team efficiently respond to incidents by following a systematic process. Preparation Checklist Your incident response checklist for the preparation phase sets the…
Read more
25 Tips for Protecting PII and Sensitive Data
We’re inundated with requests for our personally identifable information (PII) and even sensitive data yet we sometimes don’t put in the right controls to protect these assets. Organizations are constantly collecting, storing, and distributing PII and sensitive data but many individuals and even organizations still don’t quite understand the repercussions of mishandled data. Here are…
Read more
ADVANCING SOFTWARE SECURITY IN THE EU by ENISA
Secure software development and maintenance is attracting a lot of attention lately, due to the rapidly increased dependency of everyday products, services and process to the underlying software. Quite often, weaknesses behind reported security incidents and/or breaches are being materialized due to the lack of adherence on fundamental security principles and techniques. In order to…
Read more