blog.andytang.com

A Cyber Security professional, who currently holds EU GDPR Practitioner, CISSP, MCSE:Security and MCTS certifications.

Monday, 27 April 2015

Preparing for cloud worse case scenarios [Link - MTI Bytes]

I was asked to write an article about preparing for the cloud for the work blog:

http://www.mtibytes.com/post/Preparing-for-cloud-worst-case-scenarios
Posted by andytanguk at 15:25 No comments:
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Labels: Cloud, Security

Monday, 6 April 2015

Hacked? Here's what to do next [Link - Network World]

After being interview for an article for The Guardian, I've noticed a re-work of that here:

http://www.networkworld.com/article/2905311/security0/hacked-heres-what-to-do-next.html
Posted by andytanguk at 15:30 No comments:
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Labels: Cyber Security, Security
Newer Posts Older Posts Home
Subscribe to: Posts (Atom)

About Me

andytanguk
View my complete profile

My Links

  • Twitter - @andrewtang
  • My LinkedIn Profile
  • MTI - Security Practice

Twitter

Tweets by @andrewtang

Blog Archive

  • ►  2018 (2)
    • ►  August (2)
  • ►  2017 (10)
    • ►  September (1)
    • ►  August (1)
    • ►  May (7)
    • ►  February (1)
  • ►  2016 (47)
    • ►  December (2)
    • ►  November (2)
    • ►  October (1)
    • ►  September (8)
    • ►  August (4)
    • ►  July (7)
    • ►  June (2)
    • ►  May (15)
    • ►  April (1)
    • ►  March (2)
    • ►  January (3)
  • ▼  2015 (25)
    • ►  December (4)
    • ►  October (4)
    • ►  September (4)
    • ►  August (1)
    • ►  July (2)
    • ►  June (1)
    • ▼  April (2)
      • Preparing for cloud worse case scenarios [Link - M...
      • Hacked? Here's what to do next [Link - Network World]
    • ►  March (3)
    • ►  February (2)
    • ►  January (2)
  • ►  2014 (40)
    • ►  December (4)
    • ►  November (8)
    • ►  October (3)
    • ►  September (7)
    • ►  August (3)
    • ►  July (3)
    • ►  June (4)
    • ►  May (4)
    • ►  March (2)
    • ►  February (2)
  • ►  2013 (13)
    • ►  December (1)
    • ►  September (2)
    • ►  August (2)
    • ►  July (2)
    • ►  May (6)
  • ►  2012 (8)
    • ►  July (1)
    • ►  April (2)
    • ►  February (1)
    • ►  January (4)
  • ►  2011 (10)
    • ►  November (1)
    • ►  October (2)
    • ►  June (2)
    • ►  May (4)
    • ►  February (1)
  • ►  2010 (34)
    • ►  October (1)
    • ►  September (3)
    • ►  July (1)
    • ►  June (2)
    • ►  May (3)
    • ►  April (1)
    • ►  March (3)
    • ►  February (11)
    • ►  January (9)
  • ►  2009 (46)
    • ►  December (3)
    • ►  November (3)
    • ►  October (4)
    • ►  September (12)
    • ►  August (22)
    • ►  July (2)

Search This Blog

Labels

Security (35) Data Protection (25) 2FA (20) two factor authentication (20) Data Privacy (16) UAG (16) malware (16) Encryption (12) Compromise (10) Vulnerability (9) Authentication (8) Cyber Kill Chain (8) Cloud (7) Penetration Testing (7) Wireless (7) training (6) ActiveSync (4) Avira (4) BYOD (4) EMM (4) Secure Wireless (4) Websense (4) Blogger (3) CISSP (3) Cyberoam (3) MDM (3) Social Media (3) Backup Service (2) CLB (2) DLP (2) Datacentre (2) Infosec (2) Internet (2) Load Balancer (2) Remote Access (2) threats (2) ActiveX (1) Bring Your Own Device (1) CPE (1) Care.data (1) Clickjacking (1) Endpoint Data Protection (1) HTTP redirect (1) Heartbleed (1) ISC2 (1) NHS Database (1) SaaS (1) Shoulder Surfing (1) VPN (1) Version X (1) Visual Security (1) botnets (1) eBay (1)
Simple theme. Powered by Blogger.