Tag Archives: acquisition information systems

The Essential Guide to Privileged Activity Monitoring

Key Security Risks related to Privileged Users “78% of large organizations were attacked by an unauthorized outsider in the UK, in 2012.” – Information Security Breaches Survey 2013 Business users accessing sensitive data Privileged users are a potential security risk in … Continue reading

IT Security News and Event, Shell Control Box , , , , , , , , , ,

Distributed denial-of-service protection

Overview Although DDoS attacks have always posed a formidable threat to internet systems, the proliferation of botnets and the advent of new attack vectors together with the rapid adoption of broadband globally in recent years have fuelled the potency of … Continue reading

MAS Technology Risk Management Guidelines , ,

Acquisition and development of information systems

Many systems fail because of poor system design and implementation, as well as inadequate testing. The FI should identify system deficiencies and defects at the system design, development and testing phases. The FI should establish a steering committee, consisting of … Continue reading

MAS Technology Risk Management Guidelines ,