Email Security Email Phishing - Types, How to Detect & Avoid Attacks We live in an era of clogged email inboxes. Spamlaws estimates that up to 45% of all emails are spam while ... Dr. Jaber Kakar 10/19/22 4:34 PM
Compliance Security Digitalization Part 6: How to deal with the identified risks? As a reminder, in step 5, all risks from the risk inventory were analyzed and prioritized individually based ... Dr. Jaber Kakar 3/31/22 4:44 PM
Compliance Security Digitalization Part 5: Risk analysis based on the risk inventory In step 4, all risks have been added to an inventory in such a way that each risk can be categorized through ... Dr. Jaber Kakar 3/31/22 4:44 PM
Compliance Security Digitalization Part 4: Adding risks to the risk inventory Recall that step 1 is all about developing a solid understanding of security-relevant assets while step 2 ... Dr. Jaber Kakar 3/31/22 4:43 PM
Compliance Security Cloud security Cloud computing audit guidelines of Cloud Security Alliance As the popularity of cloud computing has increased over the last decade, so has the maturity of standards ... Dr. Jaber Kakar 3/31/22 4:39 PM
Compliance Security Digitalization Part 3: Catalog of reference measures and should-be comparison Recall that step 1 is all about developing a solid understanding of security-relevant assets while step 2 ... Dr. Jaber Kakar 2/16/22 5:02 PM
Security CIA triad Information security protection goals Information security and IT protection goals "availability, integrity and confidentiality" are not solely ... Dr. Jaber Kakar 1/6/22 5:37 PM
Compliance Security Digitalization Part 2: Protection needs analysis You may recall from our previous post that a solid understanding of security-relevant assets plays a ... Dr. Jaber Kakar 12/10/21 3:30 PM
Compliance Security Digitalization Part 1: Structure analysis for IT asset management Digitalization is omnipresent and it affects various businesses, including, and especially financial ... Dr. Jaber Kakar 11/23/21 12:11 PM