SAMRÆMISKRÖFUR – NIS2
Sigurður Gísli Bjarnason Inngangur Samræmiskröfur eru mikið í umræðunni á öllum þeim netöryggisviðburðum sem ég sæki þessa dagana og því datt mér í hug að leggja orð í belg. Flestir […]
Sigurður Gísli Bjarnason Inngangur Samræmiskröfur eru mikið í umræðunni á öllum þeim netöryggisviðburðum sem ég sæki þessa dagana og því datt mér í hug að leggja orð í belg. Flestir […]
Introduction In this article, I will discuss FUD, why it is a problem, how to identify it, and what to do about it. So what is FUD? FUD stands for
Introduction Presenting the Ten Commandments of Infosec. Here are ten things everyone can do today to improve their cybersecurity posture, plus one bonus for system administrators. As always, please reach
Introduction In this article, I want to go over how one might classify all the different Cybersecurity Consultancies out there and explain how we see Öruggt Net services fitting in,
I am not planning on waxing philosophy in this post, but I do want to discuss ideology or mindset of a successful cybersecurity professional. In my Vulnerability Management and Vulnerability
This blog describes what zero trust is and what you need to think about if you are wanting to go that route.
In this post we explain what goes into a good vulnerability management program, to keep it blog length it is rather high level.
Ransomware is type of self-propagating malware that encrypts your files so that you cannot read or use them until you pay a ransom. Yeah, I know, I can feel how
HOW TO PROTECT YOURSELF FROM RANSOMWARE Protecting yourself from ransomware falls into two main buckets, first is steps to take to avoid getting infected, second is being prepared to recover
I see many posts on social media asking for advice on how to get started in cybersecurity, what certifications to get, etc., so I figured I would write an article