ISO History In October 1946, ISA and UNSSC delegates from 25 countries met in London and agreed to join forces...
Internal auditing is an independent, objective assurance and consulting activity designed to add value to and improve an organization’s operations....
What is Penetration testing ? ـــــــــــــــــــــــــــــــــــــــــــــــ ـــــــــــــــــــــــــــــــــــــــــــــــ ــــــــــــــــــــــــــــــــــــــــــــــ 1- Penetration testing is a type of security testing that...
Coronavirus has brought remote working to the top of everyone’s mind. With many organizations already enabling or exploring remote working,...
Hackers are busy exploiting coronavirus in their attacks. In recent weeks SophosLabs has seen a surge of COVID- and Corona-related...
An unplanned and rapid shift to remote working is inadvertently forcing companies to relax cybersecurity controls. CIOs and CISOs must...
Malware is an “umbrella term” that describes any software or a piece of code designed to infiltrate a computer system...
Data security refers to the process of protecting data from unauthorized access and data corruption throughout its life-cycle. Data security...
As global concern grows due to the coronavirus (COVID-19) pandemic outbreak, organizations are facing rapid response challenges, from employee health...
Your company’s financial results have been leaked to the media, your confidential business plans have been compromised; your employees’ personal...