A roundup of the top news stories in information security this week, including a slew of vulnerabilities addressed by Microsoft and Adobe, researchers claim to have cracked the new iPhone X's Face ID, and more.
Latest Content From MISTI
TLS is the cornerstone of secure communications for networked communications, but are you implementing and maintaining it correctly?
As internal auditors apply risk-based auditing techniques to their reviews and increase their focus on the needs of customers to achieve organizational aims, it is essential to gain a panoramic understanding of the process. The SIPOC diagram can help.
Security awareness works, so why isn't it helping our enterprise become more secure?
People talk about a risk event as if it is obvious what it is and what it means. But that's certainly not always the case.
Security pros act incredulous when they hear of a delayed breach disclosure, but is it wrong?
Few things can derail the audit committee’s perception, confidence, and trust of internal audit faster and more profoundly than ineffective communications to and from the internal audit function.
Whether the organization as a whole is onboard or not, corporate audit needs to develop and embrace programs designed to meet the needs of a changing workforce if they are to attract and retain top talent.