The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Information security is built on top of three basic building blocks: people, processes and technology. Even when organization has very refined processes and state of the art technology, people usually remain the weakest link in the security chain. Social engineering is the practice of obtaining confidential information or valuable assets by manipulation of legitimate users or owners. Large telecommunication...
Security Risk Management is foundation and starting point for implementation of security measures in any organization and challenge by itself. But in complex organizations there are additional challenges, how to align IT Security Risk Management with overall Security Risk Management and later with the Company's overall Risk Management. When organization is part of some international corporation, corporative...
In activities to assure security of IT/NT systems and Data, where there is increasing number of attacks and where are more and more sophisticated cyber criminals, with all modern technical protection solutions in place, people are still the weakest link in the chain. And unless policy, education and training, awareness, and technology are properly employed to prevent people from accidentally or intentionally...
In today business environment different security certificates are not any more “nice to have” feature but business prerequisite for service providers. PCI DSS certification is a must for card issuers and merchants and ISO27001 certification is very often prerequisite to qualify for ICT services offering. In this paper will be shown how proper security governance and security framework on which is...
ICT services are under competitive pressure being launched daily. Because of that, security dimension in ICT services is often overlooked. To assure that security is integral part of such services, an organization needs to establish security infrastructure which will support it. Such infrastructure should consist of security documentation (policies, requirements, procedures…), established processes...
The risks and costs of information security, numerous external and internal requirements and obligations to customers, are the reason for the interest of security at the highest level in companies. A set of activities which describes the involvement of the management board, executive management, specialized committees, ad-hoc groups and security managers is referred as Security Governance. While the...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.