New European Union General Data Protection Regulation affects most US businesses
Author: Kaveh Mofidi
GDPR: Primary Actions
GDPR: start from scratch with these primary steps Following steps can be helpful identifying where you are in GDPR Compliance Journey. Consider that as a quick audit towards a more comprehensive gap analysis to understand your current situation: Role identification: Identify whether you are a a data controller, data processor, or both. Identify all data… Continue reading GDPR: Primary Actions
IT System Administration Good Exercises: Event Lookup!
Computer administration is all about how the system and network is running at the moment. What else could be more important than how zeros and ones are really interacting in background? System and Network administration starts and ends with lowest level of these environment. Those place that we barely look are the source of system… Continue reading IT System Administration Good Exercises: Event Lookup!
GDPR In A Glance
A Summary of New European Union General Data Protection Regulation The story of this legislation is to protect the personal data of the EU citizens, including how that data is collected, stored, processed/used, and destroyed once it is no longer needed. The EU General Data Protection Regulation (GDPR) is the most important change in data… Continue reading GDPR In A Glance
Three Reasons To Trust SECURE TARGET
Articles will be revealing in many aspect of information security and information technology in general, but why would you trust SECURE TARGET?
Why Environment Constantly Faces Insecurities?
There is no doubt that security is not a project, there is no end and we need to constantly evolve but does it seem to you that you may put more effort you expect? You would sense some doubt about why you are constantly running after fixing issues, but is this the way security works? … Continue reading Why Environment Constantly Faces Insecurities?
The Fine Art of Network Security Configuration: Micro Segmentation
Micro segmentation is the particle of an effective network segregation Network security administration barely leverages a concept which basically has been there forever and could literally saves them forever when dealing with security of network services, and that is nothing but micros segmentation. I usually bring practical examples to my workshops so students are able… Continue reading The Fine Art of Network Security Configuration: Micro Segmentation
How to effectively audit any ISO 27001 process?
First of all, auditor needs to be a SME, not only to the security management system, but also specifically in regards to ISO 27001. The reason is related to the fact that “terminology” or “particular definition” of terms is important. Then there are three simple aspects of any process or policy document which should have been adequately addressed by… Continue reading How to effectively audit any ISO 27001 process?
ISO 27001 Audit Tips and Tricks
the easy way to maintain an effective, low cost and smart ISO 27001 security management system Even though there is no magic behind auditing a system based on ISO 27001, there are simple tricks which help you handle ISO 27001 or many other similar standards and frameworks, both as and auditor and auditee. I would… Continue reading ISO 27001 Audit Tips and Tricks
About SECURETARGET
Once Upon A Time . . . SECURE TARGET was one of the first independent group of professional freelancers in field of IT security, founded 1996 in Islamic Republic of Iran, when even using Internet in the country was a dream! The freelance group directed by its founder, Kaveh Mofidi and initially named ‘Iran Security… Continue reading About SECURETARGET