ISMS-Alternativen zum BSI Grundschutztool

Das Bundesamt für Sicherheit in der Informationstechnik (BSI) hat mit dem IT Grundschutz eine Methode für ein effektives Management der Informationssicherheit entwickelt. Sie lässt sich flexibel an die Gegebenheiten einer Organisation anpassen. Ebenso lassen sich Gefährdungen und Risiken ermitteln und Maßnahmen für den betroffenen Geltungsbereich (IT-Verbund) ableiten.

5 Reasons for a Process Driven Approach to IAM Projects

Many technicians do not like it, since it requires communication, discussion and limits the options to play around. But there are good reasons for taking a process driven approach to IAM projects. A process driven approach ensures to …

Yes we are Open – Cybersecurity and the Future of Retail

Authors: Alexander Schellong, Jens Michael Marohn, Wolfgang Kiener According to a recent survey conducted by Forrester, an independent research firm, 97% of respondents prioritize digital innovation and Cybersecurity in 2015. In a way this comes at no surprise to the readership of this blog as the spike of cyber incidents at major retailers in 2014 and 2015 showed that they are open for customers and cybercriminals at the same time. Stationary and online retailers are a sweet spot for the latter as billions of customer transactions…

Similar but not the Same – Security for Industrial Control Systems vs. IT Systems

Today, industrial control systems (ICS) are at the center of monitoring and controlling industrial processes and operations such as production and delivery in the manufacturing sector, distribution of energy, water treatment, or managing railway transportation.

Cybersecurity vs. Data Protection

When it comes to protection of data, the terms Cybersecurity and data protection – are used synonymously. Both strive to protect data from being misused, lost, changed, exfiltrated or published without proper authorization and control mechanisms. However, there is one major difference.

Copyright 2015 21st CENTURY IT · RSS Feed · Anmelden