Guest posts Archive
In this blog post, author and consultant Lee Newcombe discusses the second edition of his book, Securing Cloud Services – A pragmatic guide, which provides insight into the security considerations associated with the adoption of Cloud services, alongside pragmatic ways …
This is a guest blog written by IT Governance Publishing author Sanjay Nair. A service desk is your one-stop destination for enquiries, requests and reporting issues. It is your first touchpoint for any service offered by a service provider. A …
In this guest blog, Leron Zinatullin, author of The Psychology of Information Security – Resolving conflicts between security compliance and human behaviour, explores how to build a security culture. A security department may sometimes be referred to by executives …
Alan Field, author of ISO 37001 – An Introduction to Anti-Bribery Management Systems and the ISO 37001:2016 ABMS Documentation Toolkit, explores the implications of seasonal gift giving. Sigmund Freud is credited with saying “Sometimes a cigar is just a …
Written by guest author Ken Lynch NIST background NIST (the National Institute of Standards and Technology) is a body responsible for creating a series of regulatory documents commonly referred to as SPs (Special Publications). For instance, NIST SP 800 is …
Eva Hanscom from Venafi explores the growing problem of machine identity threats. There are many ways that compromised machine identities can be used in cyber attacks: Attackers can misuse machine identities to establish hidden or concealed encrypted communication tunnels on …
Eva Hanscom, Venafi In her first post for the IT Governance Publishing blog, Venafi’s Eva Hanscom explains the importance of protecting machine identities. IT governance programmes formally align cyber security initiatives with business goals. It’s imperative that every member of …