Connect with us

Hi, what are you looking for?

Information Security

The purpose of this article is to explain ISO 27001 Annex: A.14.2.3 Technical Review of Applications after Operating Platform Changes, A.14.2.4 Restrictions on Changes...

Cyber Security

This program is aimed at preventing unauthorized access to systems and applications. A.9.4.1 Information Access Restriction Control– Clearly defining access controls to information and...

Cyber Security

ISO/IEC 27554 — Information technology — Security techniques — Application of ISO 31000 for assessment of identity management-related risk [Draft] Introduction To facilitate the...

Cyber Security

ISO/IEC 27551 — Information security, cybersecurity and privacy protection — Requirements for attribute-based unlinkable entity authentication [Draft] Introduction Attribute-Based Unlinkable Entity Authentication permits formal...

Cyber Security

ISO/IEC TS 27110:2021 — Information security, cybersecurity and privacy protection — Cybersecurity framework development instructions Introduction As a Technical Specification, the standard (an architecture...

Cyber Security

ISO/IEC 27400 — Cybersecurity — IoT security and privacy — Guidelines [Draft] Introduction In this standard, there is guidance on IoT security and privacy...

Cyber Security

ISO/IEC TR 27103:2018 – Information technology — Security techniques — Cybersecurity and ISO and IEC standards Introduction In the case of “cybersecurity,” which is...

Cyber Security

ISO/IEC TS 27100:2020 – Information technology — Cybersecurity — Overview and concepts Introduction As per the standard (in fact, a technical specification): “Cybersecurity is...

Cyber Security

ISO/IEC 27032:2012 – Information technology – Security techniques – Guidelines for cybersecurity Introduction Officially, ISO/IEC 27032 addresses “Cybersecurity” or “the Cyberspace security”, defined as...

Cyber Security

ISO/IEC 27006:2015 – Information technology – Security techniques – Requirements for bodies providing audit and certification of information security management systems (3rd edition) Part...

Cyber Security

ISO/IEC 27004:2016 – Information technology – Security techniques – Information security management – Monitoring, measurement, analysis and evaluation (2nd edition) Introduction A key part...

Cyber Security

This article explains A.13.1 Network Security Management, A.13.1.1 Network Controls, A.13.1.2 Security of Network Services, A.13.1.3 Segregation in Networks. A.13.1 Network Security Management Its...

More Posts
Advertisement Advertisement
  • solutions-inc
  • solutions-inc
  • solutions-inc
  • solutions-inc
Advertisement Advertisement
  • solutions-inc
  • solutions-inc
  • solutions-inc
  • solutions-inc