Hello Folks. The CIS Controls V8 is now available to download, it is an excited news. Download here: https://www.cisecurity.org/white-papers/cis-controls-v8-mapping-to-nist-csf/ Happy Day Peter Frank
Month:May 2021
Microsoft Imagine Cup always is a pleasure to work as a Judge.
Thanks a million to Microsoft and Imagine Cup for this email. My pleasure to work as a judge for helping new younger generations working for a better world. Congratulations to the four final teams. https://lnkd.in/e_94HRr #Microsoft #Imaginecup2021 Happy Day Peter Frank
What’s Ransomware for dummies?
Ransomware is a type of malware that encrypts files and folders, preventing access to important files. Ransomware attempts to extort money from victims by asking for money, usually in form of cryptocurrencies, in exchange for the decryption key. But cybercriminals won’t always follow through and unlock the files they encrypted. The trend towards increasingly sophisticated …
Continue reading What’s Ransomware for dummies?
Certified Data Privacy Solutions Engineer – ISACA Certification
Hey Folks. Today I received my first ISACA certification, yes, my first. Why do you say first?, the reason that I will be planning my next ISACA certification is Audit or Risk. I have not to close my decision but know that my goal in a short time. What’s Data Privacy? Data privacy is a …
Continue reading Certified Data Privacy Solutions Engineer – ISACA Certification
A fluent new look for the Azure icon
As your ally in the cloud, our Azure mission is to deliver thoughtfully designed products and services that equip you to solve challenges and invent what’s next. Our ability to meet your business and innovation needs is in part due to our growth mindset—which extends from front-end user experiences to small details like graphics and …
Continue reading A fluent new look for the Azure icon
Microsoft Azure Rapid 7 Integration for Vulnerability Management
Microsoft Azure Microsoft Azure is a complete cloud platform with infrastructure, software, and applications available as services. Azure can complement an on-premises infrastructure as an extension of your organization’s technical assets. When using Azure in your environment, whether you opt for the cloud or on-premises option, security and monitoring are still an essential part of …
Continue reading Microsoft Azure Rapid 7 Integration for Vulnerability Management
Use ACM Private CA for Amazon API Gateway Mutual TLS
Last year Amazon API Gateway announced certificate-based mutual Transport Layer Security (TLS) authentication. Mutual TLS (mTLS) authenticates the server to the client, and requests the client to send an X.509 certificate to prove its identity as well. This way, both parties are authenticated to each other. In a previous post, you can learn how to …
Continue reading Use ACM Private CA for Amazon API Gateway Mutual TLS
Alibaba Cloud SSL Certificates Service
SSL Certificates Service applies to the following scenarios: Encrypt website data The HTTP protocol does not support data encryption. This may cause problems such as data leaks, data tampering, and phishing attacks. After you install an SSL certificate on your website, this website encrypts website data over the HTTPS protocol during data transmission. This can …
Continue reading Alibaba Cloud SSL Certificates Service
Strengthen and optimize compliance in Azure Security Center
The Regulatory Compliance dashboard in Azure Security Center is an excellent tool for helping organizations understand their compliance posture relative to industry standards. Reporting on compliance with specific standards is obviously critical for regulated customers, though tracking compliance status is also relevant to many other organizations who want to align with industry-defined best practices. Many …
Continue reading Strengthen and optimize compliance in Azure Security Center
Art. 38 GDPR Position of the data protection officer
1. The controller and the processor shall ensure that the data protection officer is involved, properly and in a timely manner, in all issues which relate to the protection of personal data. 2. The controller and processor shall support the data protection officer in performing the tasks referred to in Article 39 by providing resources …
Continue reading Art. 38 GDPR Position of the data protection officer