In the previous articles, we have looked the concept of network segmentation. In this article, I will introduce best practices of the network segmentation.
In my previous blog series “What is Zero Trust Architecture and why is it so important to understand? ”, we looked how a modern IT infrastructure should be designed based...
How can I determine whether GDPR is applicable or not for an application/system? Without going into ‘territorial’ details, the answer is rather simple: if your application/system is processing(*) personal data,...
The boundaries between security & privacy are blurring. Today security professionals are expected to have experience in both fields and to be able to advise on cases related to protection...