#GeneralInfoSec

LBHustonlbhuston
2025-03-11

Require service providers to have adequate business continuity and disaster recovery plans that align with the organization’s own resilience strategies.

Read more πŸ‘‰ lttr.ai/AcOwZ

LBHustonlbhuston
2025-02-15

Ensure you understand which security responsibilities are yours and which security responsibilities belong to the service provider.

Read more πŸ‘‰ lttr.ai/Aba3n

LBHustonlbhuston
2025-02-15

This is a new world since I first began in the information security business.

Read more πŸ‘‰ lttr.ai/Aba19

LBHustonlbhuston
2025-02-14

Here is some advice on IR communications that has proven beneficial to the organizations that we have worked with in the past

Read more πŸ‘‰ lttr.ai/AbYuE

LBHustonlbhuston
2025-01-25

In this blog I will outline this guidance as it applies to Information security training and awareness programs.

Read more πŸ‘‰ lttr.ai/AavUT

LBHustonlbhuston
2025-01-25

They are adept at creating policies and strategies customized to your organization's specific needs, ensuring a robust cybersecurity infrastructure.

Read more πŸ‘‰ lttr.ai/AavSx

LBHustonlbhuston
2025-01-23

They are already using voice cloning to convince people to reveal private information or to allow them access to private systems with great success.

Read more πŸ‘‰ lttr.ai/AarE9

LBHustonlbhuston
2024-12-28

As must be readily apparent, the final result is going to be a mountain of documentation that, despite its complexity, must be readily accessible and comprehensible to all that are governed by it.

Read more πŸ‘‰ lttr.ai/AZ4io

LBHustonlbhuston
2024-12-25

Their guidance on regulatory reporting decisions ensures you navigate complex requirements with confidence, balancing compliance obligations with your organization's best interests.

Read more πŸ‘‰ lttr.ai/AZz3I

LBHustonlbhuston
2024-12-20

When combined with encryption of sensitive data across your network and backups, these controls pose a formidable obstacle for attackers to overcome.

Read more πŸ‘‰ lttr.ai/AZr2u

LBHustonlbhuston
2024-12-04

The most comprehensive and current guidance on this subject can be found in the NIST special publication 800-161r1, Cybersecurity Supply Chain Risk Management Practices for Systems and Organizations (C-SCRM).

Read more πŸ‘‰ lttr.ai/AZNAF

LBHustonlbhuston
2024-11-14

Zero-Trust Network Access: Strengthening Your Cybersecurity

Read more πŸ‘‰ lttr.ai/AYnSq

LBHustonlbhuston
2024-11-13

Ensure security settings are enabled and applied in cloud environments.

Read more πŸ‘‰ lttr.ai/AYkkD

LBHustonlbhuston
2024-11-12

I also recommend contacting similar organizations and user groups to see what advice they can give you from their own experiences with handling communications during an incident.

Read more πŸ‘‰ lttr.ai/AYjQD

LBHustonlbhuston
2024-11-12

What information security focused on then was signals and physical security.

Read more πŸ‘‰ lttr.ai/AYjPy

LBHustonlbhuston
2024-11-09

They also need to know how to react to suspected security attacks, and who and how to report these issues to.

Read more πŸ‘‰ lttr.ai/AYhNG

LBHustonlbhuston
2024-10-28

Section 14 of the Center for Internet Security Critical Security Controls (CIS CSC) V8 covers security awareness and skills training.

Read more πŸ‘‰ lttr.ai/AYVcz

LBHustonlbhuston
2024-10-25

They consider reputational damage, regulatory fines, legal liabilities, and operational impacts to inform your decision.

Read more πŸ‘‰ lttr.ai/AYTIO

LBHustonlbhuston
2024-10-23

Foundational Cybersecurity Development: A vCISO is key in establishing a solid cybersecurity framework.

Read more πŸ‘‰ lttr.ai/AYMkb

LBHustonlbhuston
2024-10-22

"Years ago, I wrote a blog about the dangers posed by digital recording of images and sound; about the fact that perfect fake digital recordings could be generated at will given the proper amount of computing power and expertise." lttr.ai/AYKO2

Client Info

Server: https://mastodon.social
Version: 2025.04
Repository: https://github.com/cyevgeniy/lmst