TISAX, a standard in the automotive industry

TISAX®, an information security mechanism in the automotive industry

Based on the standard ISO 27001 and adapted to the requirements of the automotive field, the TISAX® (Trusted Information Security Assessment Exchange) mechanism was developed by the VDA (Verband der Automobilindustrie, the German automotive industry association) in partnership with an association of European automotive manufacturers, called the European Network Exchange (ENX). The TISAX® security audit mechanism allows the mutual acceptance of information security assessments (carried out by trusted and certified third parties) in the automotive industry and provides a common… Read More >>

SMSI

The value of an Information Security Management System for an organization

A risk manager should always assume that the list of risks considered, however extensive, is incomplete. Douglas W. Hubbard ISO 27001 is an international information security standard, which sets a framework of requirements that an organization must meet to manage its security activities with success. The application of this standard is only possible through the implementation and adoption of an Information Security Management System (ISMS). An ISMS certified ISO 27001, without being an end in itself, clearly provides a guarantee… Read More >>

I LOVE DSGVO

I LOVE GDPR ♥

Security is everyone’s concern. Edouard PHILIPPE Since 25 May 2018, the General Data Protection Regulation (GDPR) has been applied for all European Union countries. The main objective of this regulation is to standardize the protection of individuals’ personal data. The GDPR is clearly a technical, legal and organizational subject. In my opinion, this regulation is an undeniable opportunity to control our data and to regain control of our digital life. It is a beautiful tool that will however be necessary… Read More >>

I'M RGPD

I AM GDPR

The EU’s General Data Protection Regulation (GDPR) intends to strengthen and unify personal data protection for all individuals within the European Union. This regulation imposes totally new requirements on how organizations must process such data, which means that companies must step up their efforts in information security management and associated investments. It is important to specify that the regulation (which is already in force, only the application of sanctions is postponed until March 2018) is binding for all companies, European… Read More >>

Wie kann man das Desktop des IT-Administrators sichern?

How to secure IT administrators’ desktops?

The weakest link in a chain is the strongest because it can break it. Stanislaw Jerzy Lec Information Systems (IS) have developed considerably and are constantly progressing. The Information Systems Security is crucial from an economic and State standpoint, and even from a personal perspective. However, the Information Systems Security is based mainly on its weakest link, which is also the essential element: the human. The administrator who has a power and a very strong responsibility is no exception to… Read More >>