article thumbnail

Microsoft misfire: what can be learnt from the tech giant’s cybersecurity failings

SRM

Earlier this month, a federal cybersecurity watchdog group reported that Microsoft’s cloud cybersecurity has colossal and far-spanning shortcomings, including failed technology and an “inadequate” security culture that “requires an overhaul.” Despite huge financial resources, risk management has been treated as an afterthought.

article thumbnail

The Best Risk Management Courses on Pluralsight to Consider Taking

Solutions Review

The editors at Solutions Review have compiled this list of the best risk management courses on Pluralsight to consider taking. . Risk management is an essential skill in the data protection space. This list of the best risk management courses on Pluralsight below includes links to the modules and our take on each.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

ISO 27001 Certification Requirements & Standards

Reciprocity

Deciphering the various numbers can be confusing at first, but each standard is numbered and deals with a specific facet of managing your company’s information security risk management efforts. Conduct a Risk Assessment. Analyzing risks. Evaluating risks. Choosing risk-reduction treatments.

Audit 52
article thumbnail

What Does It Take to Be FIPS Compliant?

Pure Storage

Department of Commerce, it’s primarily concerned with the economic security of the country and helps promote this mission via technology standards that protect against digital theft and cybersecurity attacks. The difference between FIPS approved (or, “certified”) and FIPS compliant is official approval from an accredited lab.

article thumbnail

IRM, ERM, and GRC: Is There a Difference?

Reciprocity

The various niches of risk management have become a veritable alphabet soup of acronyms. As a result, we now have: Enterprise risk management (ERM). Governance, risk management, and compliance (GRC). Integrated risk management (IRM). The advent of the digital age is partly to blame.

article thumbnail

SOC 2 vs ISO 27001: Key Differences Between the Standards

Reciprocity

Designed by the International Standards Organization (ISO), ISO 27001 spells out industry standards for an information security management system (ISMS). The ISO 27001 statement of applicability focuses on preserving the confidentiality, integrity, and availability of information as part of the risk management process.

Audit 52