Email Security Email Phishing - Types, How to Detect & Avoid Attacks We live in an era of clogged email inboxes. Spamlaws estimates that up to 45% of all emails are spam while ... Dr. Jaber Kakar 10/19/22 4:34 PM
Security Ransomware WannaCry How WannaCry compromised IT security worldwide Basic information about WannaCry It is a virus that spread to at least 74 countries four most affected ones ... Bahaa Alatassi 10/5/22 10:36 AM
Compliance Network Security Database Security Startups are subject to cyber attacks - MiTM Case Study A famous Berliner startup for supermarket delivery services heavily relies on IT solutions. After all, ... Bahaa Alatassi 9/5/22 10:07 AM
Compliance Security Digitalization All you need to know about ISO 27001 The rapid digital transformation emerged the need to consider safe cyber systems that respond to the needed ... Bahaa Alatassi 7/19/22 3:00 PM
Compliance Security Digitalization Part 6: How to deal with the identified risks? As a reminder, in step 5, all risks from the risk inventory were analyzed and prioritized individually based ... Dr. Jaber Kakar 3/31/22 4:44 PM
Compliance Security Digitalization Part 5: Risk analysis based on the risk inventory In step 4, all risks have been added to an inventory in such a way that each risk can be categorized through ... Dr. Jaber Kakar 3/31/22 4:44 PM
Compliance Security Digitalization Part 4: Adding risks to the risk inventory Recall that step 1 is all about developing a solid understanding of security-relevant assets while step 2 ... Dr. Jaber Kakar 3/31/22 4:43 PM
Compliance Security Cloud security Cloud computing audit guidelines of Cloud Security Alliance As the popularity of cloud computing has increased over the last decade, so has the maturity of standards ... Dr. Jaber Kakar 3/31/22 4:39 PM
Compliance Security Digitalization Part 3: Catalog of reference measures and should-be comparison Recall that step 1 is all about developing a solid understanding of security-relevant assets while step 2 ... Dr. Jaber Kakar 2/16/22 5:02 PM
Security CIA triad Information security protection goals Information security and IT protection goals "availability, integrity and confidentiality" are not solely ... Dr. Jaber Kakar 1/6/22 5:37 PM
Compliance Security Digitalization Part 2: Protection needs analysis You may recall from our previous post that a solid understanding of security-relevant assets plays a ... Dr. Jaber Kakar 12/10/21 3:30 PM
Compliance Security Digitalization Part 1: Structure analysis for IT asset management Digitalization is omnipresent and it affects various businesses, including, and especially financial ... Dr. Jaber Kakar 11/23/21 12:11 PM