IoT Devices

Here’s How You Can Secure Your IoT Devices

Smart devices are taking over our world and invading every corner of our lives. From smartphones to smartwatches, even our kitchen gadgets are turning...
Internet of Things Trends

Top 5 IoT Trends For Small and Medium Businesses

It's been a great decade to be an entrepreneur, with many opportunities and technology at business' fingertips. Small and medium business have been seeing...
Security Trends

Top Security Trends in IoT For 2017

We cannot discuss technology, IoT (Internet of Things) and the internet, without also discussing security. Whenever we connect to the internet, there is always...
one-time-passwords

Learn about One-Time Passwords in CISSP

Now, let's discuss One-Time Passwords. One-Time Passwords As its name implies, a one-time password (OTP) is a password that is valid only once. This is usually...
biometrics

Learn about Biometrics in CISSP

Continuing our discussion on the authentication methods, we are going to talk about Biometrics. Biometrics Applying statistical analysis to biological data. The third category of authentication methods...
about-access-control

Learn about Access Control in CISSP

As I told you earlier in this series when talking about categories of security countermeasures, there are three categories of countermeasures: administrative, physical, and...
access-control

Learn What is Access Control in CISSP

Welcome to Access Control; another important domain from the eight domains that the CISSP exam will challenge your knowledge in. And apart from the exam,...
policies-and-procedures

Learn Different Types of Policies and Procedures in CISSP

2
An organization should define its security plan. Security follows a top-down approach. In other words, the security strategy and scope are discussed, defined, and...
risk-analysis

Learn About the Different Types of Risk Analysis in CISSP

0
In the previous article, we talked about the risk assessment process. The output of this process is a list of existing vulnerabilities, associated threats,...

Learn about Risk Management in CISSP

0
Earlier in this series, we have defined risk as the possibility or chance that a threat agent would exploit an identified vulnerability to gain...