Date Range
Date Range
Date Range
Information Security Trends blogged from ATL. This week, we were instructed to do an overview of our posts for the semester and then discuss the topics we covered and whether or not they would be useful for an Information Security professional. Especially in regards to security professionals? And if so, which ones? A single.
Friday, February 28, 2014. I had posts on Security considerations for contract workers, security equipment, Government IT issues, Risk Management systems, standards in cyber security, secure cellphones, and data breaches. Sunday, February 23, 2014. Data Lessons from the NSA.
Saturday, February 28, 2015. Week 12 - The Lessons of Threat Modeling. The threat modeling is a common assessment that every individual performs daily. When we are driving or addressing home security, we implicitly assess the threats that pose a risk to our being. Organizations approach threat modeling in the same manner. What threats and vulnerabilities may impact the existence of the company? Shostack, A. Monday, February 16, 2015.
Nothing can be totally secure in practice for a number of reasons, some of them unavoidable, but we can always minimize the chances of a security compromise. Infosec is quite a broad field. History repeats its self .
The stress response can be controlled consciously by first understanding what the stressful situation is, and then adapting to the stressor by implementing methods of relief. If we become mindful of an anxiety arousing situation, we can then battle the stressor by applying simple relaxation techniques that will calm both the mind and the nervous system. Here comes the tricky part. We know that we have a limit.