Firewalls – Love Them or List Them
Zero trust is the current rallying cry for security architecture. Does that signal the death knell for firewalls?
Zero trust is the current rallying cry for security architecture. Does that signal the death knell for firewalls?
Poorly constructed analytics dashboards can be difficult for users to consume at the best of times. Making dashboards accessible for a broad range of users with neurodiverse and physical limitations is doubly challenging. Yet it is not impossible. In this paper, IBRS recommends a range of better practices for building highly accessible and effective dashboards with the features of Microsoft’s Power BI.
No cyber security program can be successful if the executive buy-in is not secured during its initial planning stages. However, many organisations still lack top management that believes in a strong security culture – or invest the time and resources needed to establish and maintain one. What factors contribute to their shortsightedness, and what strategies can CISOs use to convince them otherwise?
Securing an environment can be a challenging task. What framework to select, NIST Cyber Security Framework, ISO27000 or others? The Center for Internet Security’s CIS Controls provide an approachable solution to that challenge.
Struggling to define a security strategy or roadmap? Starting with security principles can ease the pain.
Implementing a cyber security framework can be difficult due to the lack of practical detail in most conceptual frameworks, making it challenging to minimise risk. The Center for Internet Security’s (CIS) controls provide a tactical approach to supplement and measure an organisation’s security stance.