Management, compliance & auditing

Chapter 6 – End-user device security [updated 2019]

This is Chapter 6 in Tom Olzak's book, "Enterprise Security: A practitioner’s guide." Chapter 5 is available here: VLAN Network Segmentation and Security- C

Acceptable Use Policy (AUP) template for public WiFi networks [Updated 2019]

Acceptable Use Policies (AUPs) are an essential component to all organizations, companies, and other establishments offering Internet or Intranet access.

Supply chain threats in 2019 and beyond

Businesses do not act alone when providing services or products to their customers. They often have manufacturers, suppliers and distributors included in the

How privacy laws have changed security auditor requirements

Introduction At the outset of 2018, it was hard to predict what the year ahead would have in store for consumer privacy. Between revelations of user data-sha

How has the GDPR changed the role of a security manager?

Introduction In the wake of data breaches, hacks and leaks of trust like those by Cambridge Analytica, user privacy has quickly become a key issue of our tim

Which states have the toughest privacy laws?

Introduction Despite its high-tech advances, the United States lags behind other developed countries in protecting consumer privacy. Unlike most other develo

How to ensure Windows Server is GDPR-compliant

Introduction The General Data Protection Regulation (GDPR), an EU law regulating the processing of personal data, came into force on May 25th, 2018. Organiza

Guide to COBIT 2019

The Information Systems Audit and Control Association (ISACA) has recently introduced the first update for its COBIT 5 framework. The updated version, COBIT

Management guide for CISOs: Responsibilities, strategies and best practices

Chief Information Security Officer (CISO) is a role that is becoming prevalent in a variety of companies that have sophisticated cybersecurity protocols. A C

Information security manager skills and traits

One of the most sought-after information security positions available today is that of information security manager. Information security managers are integr