CyberChronicles – Information Security Best Practices Overview


Overview of best practices in Information Security including the importance of security policies, vulnerability assessments, testing, cryptography, authentication, legislation, regulations, moral, ethics, and individual responsibility.

Links:

https://globallearningnews.wordpress.com/2016/04/01/cyberchronicles-information-security-best-practices-overview 

#InformationSecurity #CyberSecurity #DrJoseCampus

White-hat hackers key to securing connected cars | CIO

Screen Shot 2016-02-13 at 12.55.19 AM.pngFederal regulator warns of security and privacy risks in connected cars, calling on manufacturers to partner with white-hat hackers to seek out flaws and vulnerabilities.

via White-hat hackers key to securing connected cars | CIO.

Links:

http://www.cio.com/article/3032307/security/white-hat-hackers-key-to-securing-connected-cars.html

https://globallearningnews.wordpress.com/2016/02/13/white-hat-hackers-key-to-securing-connected-cars-cio

 

FACT SHEET: Cybersecurity National Action Plan | whitehouse.gov

The President is directing his Administration to implement a Cybersecurity National Action Plan (CNAP) that takes near-term actions and puts in place a long-term strategy to enhance cybersecurity awareness and protections, protect privacy, maintain public safety as well as economic and national security, and empower Americans to take better control of their digital security.

via FACT SHEET: Cybersecurity National Action Plan | whitehouse.gov.