The most relevant are evaluation methods, certification, and accreditation that establish whether the information technology products or systems meet set standards of security. Most of these are based on a recognized framework known as the Common Criteria. The CC is… Read More "Key Concepts of Common Criteria Evaluation"

Security and Third Parties in Cybersecurity
As operations become increasingly complex, organizations have to be increasingly dependent on third-party vendors and service providers. This dependence brings about a lot of security risks. This section considers some aspects of security related to third parties, among them being… Read More "Security and Third Parties in Cybersecurity"