Information Security and Risk Management in Context with Dr. Barbara Endicott-Popovsky

For any information system to serve its purpose, the information must be available when it is needed. This means that the computing systems used to store and process the information, the security controls used to protect it, and the communication channels used to access it must be functioning correctly. High availability systems aim to remain available at all times, preventing service disruptions due to power outages, hardware failures, and system upgrades. Ensuring availability also involves preventing denial-of-service attacks, such as a flood of incoming messages to the target system essentially forcing it to shut down.

Spotlight

Digital Locksmiths, Inc

Digital Locksmiths protects your organization by going beyond technology. We look not only at the devices that make up your network, but at how your employees, clients, and consumers use the network.

OTHER VIDEOS

Cloud Data Security Solutions | Imperva

video | September 29, 2022

Cloud computing security is a set of technologies and strategies that can help your organization protect cloud-based data, applications, and infrastructure, and comply with standards and regulations....

Watch Now

VoCALL 16 is cyber secure – Extended Version

video | September 28, 2022

VoCALL 16 is a high specification loop driven intelligent digital emergency voice communication system. The system has been designed within Eaton’s stringent cyber security guidelines to ensure that all external connections are secure. With VoCALL 16 you are protected against unauthorized and malicious users....

Watch Now

What is the current cyber security landscape here like?

video | September 28, 2022

As the world becomes more digitally connected, cyber attacks will continue with greater frequency and severity. Governments, corporations and consumers will continue to need protection from cyber security threats. With government initiatives set to open more doors for Information and Communication Technology (ICT) professionals than before, abundant employment opportunities await job seekers in the ICT sector....

Watch Now

Accelerating Cybersecurity: Palo Alto Networks and NVIDIA DPU-Powered Intelligent Traffic Offload

video | June 26, 2022

Cyber-attacks are gaining sophistication and frequency, presenting an ever-growing challenge. Firewalls must perform a deeper inspection to address new threats and can no longer keep up with the explosion in traffic. Attempts to keep pace either result in network bottlenecks or become cost-prohibitive due to the deployment of many more #firewalls on larger servers....

Watch Now

Spotlight

Digital Locksmiths, Inc

Digital Locksmiths protects your organization by going beyond technology. We look not only at the devices that make up your network, but at how your employees, clients, and consumers use the network.

Events