Security terms are sometimes confusing. And like all expressions, sometimes the definition can get subtly changed over time. An example of this is “security assessment” versus “penetration test”. I ...
From the faltering of the Iraqi security forces in the face of the so-called Islamic State in 2014 to the current controversy surrounding U.S. arms sales to Saudi Arabia, U.S. security sector ...
There are almost as many different cybersecurity assessments as there are myths about them. It’s important to know what’s true. Let’s face it: Security assessments aren’t much fun for the team on the ...
Corporations today face increased levels of risk from software vulnerabilities hidden in their business-technology systems and from hackers and cyber crooks who try to steal proprietary corporate ...
In 2017, the Security Leadership Research Institute (the Security Executive Council’s research arm) asked security practitioners to choose from a list of which risk-related activities their security ...
Data security is under increasingly strict supervision in China. Charles Feng, Yifan Lu and Lian Xue of Tahota provide a guide and explain when a security assessment is necessary for a cross-border ...