Information Security

Interview with Cybersecurity Leader Oz Alashe

By IGW Staff / June 13, 2019 / 0 Comments

BRITISH MILITARY LEADERSHIP PREPARED HIM FOR DEFENSE AGAINST CYBER THREATS Oz Alashe MBE leads the […]

Read More →

Star Struck Reasonable Security under CCPA

By IGW Staff / June 10, 2019 / 0 Comments

Navigating “Reasonable Security” under California’s Consumer Privacy Act California is the birthplace of stars, the […]

Read More →
Infogovworld-What-is-security-awareness-training

What is Security Awareness Training?

By IGW Staff / September 24, 2018 / 0 Comments

Employees’ human errors are the weakest link in securing an organization’s confidential information. However, there […]

Read More →
Security-Awareness-Training-Quick-Win-for-IG-Programs

Security Awareness Training – a Quick Win for IG Programs

By IGW Staff / September 26, 2018 / 0 Comments

People are the First Step in Securing the Enterprise One of the quick wins that […]

Read More →
Stepping-into-security-assessment-part-1

Stepping Into Security Assessments

By Baird Brueseke / September 26, 2018 / 0 Comments

Part 1, Selecting a framework In today’s cyber threat landscape, companies have a fiduciary duty […]

Read More →
What-is-a-vulnerability-assessment

What is a Vulnerability Assessment?

By IGW Staff / September 26, 2018 / 0 Comments

The term vulnerability assessment applies to a broad range of systems. For example, in the […]

Read More →

Cyber-Risk Insurance—an Interview with Judy Selby

By IGW Staff / September 24, 2018 / 0 Comments

Sitting down with the in-demand author and speaker Judy has over 25 years of experience […]

Read More →
What-is-Penetration-Testing

What is Penetration Testing?

By Baird Brueseke / September 24, 2018 / 0 Comments

Reduce Risk with Simulated Attacks Penetration testing (“pen test”) is a technique used by information […]

Read More →
Scroll to Top