Trust in Cyberspace

As we expand on the train of thought from (ISC)2®’s whitepaper Code (In)Security, which closed with the admonition that “insecure code means checkmate,” we must realize that the state of affairs when it comes to software security is even more than a chess game; it’s nothing less than a battle – a battle between the attackers and the defenders; between those who are trying to break your software and those who are trying to defend it at all costs; between the black hats and the white hats. We are at war, and a war in which the enemy is not only merely subtle, but in most cases invisible. The theme for the Randolph Air Force base conference, “Cyber Security, the Invisible Man”a only accentuates this point

Spotlight

IT Security Experts Ltd

ITSE is an organisation that does just one thing.....IT Security... We are a focused organisation that brings together the Policy and Process of the Business and enforces it with Technology. We understand that frequently in organisations, Security or Corporate Governance hinders the abilities and creativity of it's employees and through a deep understanding of our clients internal business processes and perceived business threats, we provide advice, consultancy and solutions to this age old problem. With deep networking and technical skills, our consultants have a wide range of Security Certifications, from vendor specific through to CISSP, ECSA and CEH, we work with our clients as an outsourced security function.

OTHER WHITEPAPERS
news image

Adobe Acrobat with Document Cloud Services Security Overview

whitePaper | October 26, 2022

At Adobe®, we know the security of your digital experiences is important. Security practices are deeply ingrained into our internal software development and operations processes and tools and are rigorously followed by our cross-functional teams to prevent, detect, and respond to incidents in an expedient manner.

Read More
news image

The EU Cybersecurity Certification Scheme

whitePaper | September 28, 2022

GlobalPlatform is a technical standards organization that enables the efficient launch and management of innovative, secure-by-design digital services and devices, which deliver end-to-end security, privacy, simplicity, and convenience to users. It achieves this by providing standardized technologies and certifications that empower technology and service providers to develop, certify, deploy, and manage digital services and devices in line with their business, security, regulatory, and data protection needs.

Read More
news image

2023 Cloud Security Trends | Sponsored by AWS Marketplace

whitePaper | January 18, 2023

In the past few years, major cloud providers are improving their security controls for customers and increasing visibility into their security solutions. Emerging trends such as endpoint detection and response and Zero Trust have focused the security community on the capabilities and services of both cloud and solution providers.

Read More
news image

Adobe Primetime Advertising Security Overview

whitePaper | December 30, 2022

At Adobe®, we take the security of your digital experience and assets seriously. Security practices are integrated into our internal software development processes, operations, and tools. Our cross-functional incident response teams are proactive and nimble in preventing, detecting, and responding to incidents. Furthermore, our collaborative work with partners, leading researchers, and other industry organizations helps us stay updated with the latest threats, vulnerabilities, and security best practices; thereby enabling us to continually build security into the products and services we offer and regularly incorporate advanced security techniques into our product and service offerings.

Read More
news image

Cloud Security Survey 2023: Infrastructure Protection Best Practices

whitePaper | September 23, 2022

This survey was distributed by VMware User Group (VMUG) to their user base between July and September 2022. The responses were analyzed by the phoenixNAP team and key findings are presented in this document.

Read More
news image

Addressing The New Threat in Modern It Infrastructures

whitePaper | December 29, 2022

Data has become a new global currency. As with other currencies, it has also become a target for threats from those who wish to exploit its value. Ransomware is the new threat to data and it’s wreaking havoc on businesses of all sizes around the world. Until recently, if you ask an IT organization to describe typical causes for service outages they would most likely mention network failures, power failures, hardware failures, user error, etc. In today’s world, we can add ransomware to that list.

Read More

Spotlight

IT Security Experts Ltd

ITSE is an organisation that does just one thing.....IT Security... We are a focused organisation that brings together the Policy and Process of the Business and enforces it with Technology. We understand that frequently in organisations, Security or Corporate Governance hinders the abilities and creativity of it's employees and through a deep understanding of our clients internal business processes and perceived business threats, we provide advice, consultancy and solutions to this age old problem. With deep networking and technical skills, our consultants have a wide range of Security Certifications, from vendor specific through to CISSP, ECSA and CEH, we work with our clients as an outsourced security function.

Events