• (0)
    ISO-27001-ISO-22301-blog

    Tag: “vulnerabilities”

    How to use penetration testing for ISO 27001 A.12.6.1
    A famous historical hacker, Kevin Mitnick, said on one occasion: “I get hired by companies to hack into their systems...
    A famous historical hacker, Kevin Mitnick, said on one occasion: “I get hired by companies to hack into their systems and break into their physical facilities to find security holes. Our success rate is 100%;...
    What Can War Teach Us About Mainframe Security?
    The mainframe environment, or Big Iron, continues to grow at a rate of about 5% per year according to recent...
    The mainframe environment, or Big Iron, continues to grow at a rate of about 5% per year according to recent predictions. While experts have historically considered the Mainframe to be the safest environment from a...
    How to deal with insider threats?
    “Your ISO 27001 is nice in theory, but if our system administrator goes crazy, we’re dead.” – I hear this...
    “Your ISO 27001 is nice in theory, but if our system administrator goes crazy, we’re dead.” – I hear this quite often when speaking to my clients about which security controls they should apply. And...