article thumbnail

A must-read IT security handbook: TAG Cyber's massive 2017 guide

Tech Republic Security

The handbook includes tech recommendations on 50 controls, interviews, and vendor lists. TAG Cyber CEO Dr. Edward Amoroso has created a 1,200+ page resource for cybersecurity pros.

Handbook 167
article thumbnail

Securing the Final Frontier: NASA Space Security Best Practices Guide

SecureWorld News

It released the Space Security: Best Practices Guide (BPG) , a landmark document designed to safeguard every satellite, communication, and mission from the lurking threats of the digital unknown. Mitigating Risks, Not Replacing Requirements: The BPG acts as a supplementary tool, not a replacement for existing security standards.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Key skills tech leaders need to secure a board seat

CIO Business Intelligence

We’ve also published, in partnership with the Internet Security Alliance (ISA), the 2023 Director’s Handbook on Cyber-Risk Oversight. Careers, CIO, CSO and CISO, IT Leadership, Security It’s the fourth edition, and been distributed to our 23,000 members and made available to the public. It’s a win-win.

Security 116
article thumbnail

WFH ‘pioneer’ Auth0 shares advice for managing a remote workforce and returning to the office safely

GeekWire

Auth0’s “Back to Office Guidelines” handbook includes guidance on social distancing in the lobby. Salesforce Ventures leads $120M round for Seattle-area identity security startup Auth0. based security startup to go full WFH amid the global health crisis. Auth0 Image).

Handbook 121
article thumbnail

Pinterest whistleblower Ifeoma Ozoma has a new way for tech workers to speak out

The Verge

On Wednesday, Ozoma launched the Tech Worker Handbook — a comprehensive online resource to help employees who want to speak out. The website includes information on how to secure legal counsel, engage with the media, and maintain digital and physical security. It’s not a step by step guide,” Ozoma says.

article thumbnail

Cybercriminals Exploiting HR Policy Announcements in Phishing Attacks

SecureWorld News

Abnormal Security, a cybersecurity solutions provider, has published research on these phishing attacks , highlighting two specific types: payload-based credential phishing attacks and link-based credential phishing attacks. These emails typically include links or attachments that are used to steal employee credentials.

article thumbnail

How DBAs can take on a more strategic role

CIO Business Intelligence

While they played a critical enterprise role, it was primarily behind-the-scenes to ensure the integrity, security, and availability of the database. Not that long ago, database administrators (DBAs) were perceived as purely technical experts. Today, DBAs are being pulled into the limelight. Corporate data is gold, and DBAs are its stewards.