Cyber-Espionage: Every Business is a Target (more…)Cindy Kaplan2024-08-01T19:41:33+00:00Tags: advanced controls, APT, China, cyber espionage, hacking, host based controls, malware, Malware defense, Network based controls, Policies, SIEN|
Your Policies Can Hurt You, Part 2: Overzealous Policies Can Create Breach-Prone EnvironmentsEarly on in my information security career I was auditing a firm that (more…)Cindy Kaplan2024-06-28T19:22:04+00:00Tags: Audit, Governance & Compliance, Information Security, Personally Identifiable Information, PII, Policies|
Information Security Policies (more…)Cindy Kaplan2024-06-28T20:50:47+00:00Tags: data, Incident response, password, Policies, procedures, standards|
Incident Response HandlingYou have an incident – may be a breach in progress, (more…)Cindy Kaplan2024-07-02T18:39:50+00:00Tags: eradication, incident, Incident Response Plan, IR, Policies, security incident|