• (0)
    ISO-27001-ISO-22301-blog

    Tag: “Security controls”

    What to include in an ISO 27001 remote access policy
    In this era of data-driven IT, managing and securing your data / information has become the most integral part of...
    In this era of data-driven IT, managing and securing your data / information has become the most integral part of running your business. In the article below, we will take you through the best practices...
    Can ISO 27001 help your organization in a DDoS attack?
    In a connected world where hundreds of transactions are made every minute, every second your systems are down or inaccessible...
    In a connected world where hundreds of transactions are made every minute, every second your systems are down or inaccessible may represent a significant impact on your organizations’ business. And, while prevention of infrastructure failures...
    How to use NIST SP 800-53 for the implementation of ISO 27001 controls
    In my previous article, How to use the NIST SP800 series of standards for ISO 27001 implementation, I made a...
    In my previous article, How to use the NIST SP800 series of standards for ISO 27001 implementation, I made a description about the NIST SP800 series (documents describing computer security practices, published by the National...
    How to use the NIST SP800 series of standards for ISO 27001 implementation
    Although ISO 27001, an international standard for information security management, provides control objectives and controls that cover a wide range of...
    Although ISO 27001, an international standard for information security management, provides control objectives and controls that cover a wide range of security issues, they are not exhaustive. Thus, ISO 27001 clauses 6.1.3 b) and c) note...
    ISO 27001 project management: Implementing complex security controls using Work Breakdown Structure (WBS)
    What do diverse situations like the Battle of Trafalgar (1805), the Cooley–Tukey FFT algorithm (1965), and the multi-sided market competition...
    What do diverse situations like the Battle of Trafalgar (1805), the Cooley–Tukey FFT algorithm (1965), and the multi-sided market competition have in common? They are all examples of big or complex problems divided into smaller...