CyberSecurity-Topics

PLC's
PLC's are devices that are used to control and automate industrial and commercial processes. They are used in a variety of applications such as factory ...
Wed, 13 Jul, 2022 at 9:31 AM
HIPAA
To secure the integrity of Protected Health Information, covered entities and business partners are required to comply with the physical, administrative, an...
Wed, 13 Jul, 2022 at 9:30 AM
CCPA
In response to the frequent occurrences of data breaches in Big Tech caused by inadequately defined access controls and privacy management, the California C...
Wed, 13 Jul, 2022 at 9:39 AM
VCDPA
Customers have the right to view their data and ask corporations to erase their personal information under the VCDPA. Additionally, it mandates that busines...
Wed, 13 Jul, 2022 at 9:50 AM
SCADA
A SCADA system is a set of software and hardware that enables the automation of industrial processes and the data collection inside them. These are used to ...
Wed, 13 Jul, 2022 at 10:02 AM
HMIs
HMI-Human Machine Interface is a user interface or dashboard that connects person to a machine, system or device. HMIs are used an operator's means to i...
Wed, 13 Jul, 2022 at 10:23 AM
Employee Lifecycle Management
Identity Management  The employee life cycle (ELC) is an HR model that keeps track of an employee's full path while working for your company. It sta...
Wed, 13 Jul, 2022 at 12:19 PM
Static Code Scanning
Static Code Analysis is typically carried out at the Implementation phase of a Security Development Lifecycle (SDL) as part of a Code Review. By using metho...
Wed, 13 Jul, 2022 at 1:50 PM
Employee Device Management
Employee device management can also be known as mobile device management. The process of securing, overseeing, and managing the usage of mobile devices, suc...
Wed, 13 Jul, 2022 at 2:04 PM
Dynamic Code Scanning
The goal of dynamic code analysis, also known as dynamic application security testing (DAST), is to check a running application for vulnerabilities that mig...
Wed, 13 Jul, 2022 at 2:12 PM