Christina Stokes
11 posts by

Christina Stokes

SOC II & ISO 27001 | International Standards

SOC II & ISO 27001 | International Standards

Both SOC II Compliance and ISO 27001 provide criteria and frameworks to establish information security management systems. Both are globally recognized. There are slight differences to each and enterprises must consider certain factors about their own product/services, industry, and regulatory governance when looking at either SOC II Compliance or…

SOC II Compliance

SOC II Compliance

SOC II Compliance Information security is important for all organizations including, not limited to, cloud-computing providers and Software-as-a-Service (SaaS) companies. Data can be mishandles by application and network security providers leaving these enterprises vulnerable to cyber threats such as extortion, data theft, and malware installation. SOC II Compliance is important…

What is SaaS?

What is SaaS?

What is SaaS? Software-as-a-Service or SaaS is a software distribution model where cloud providers host applications and make that data/service available to end users over the internet. SaaS is one of three categories of cloud computing. Alongside it you will find both infrastructure-as-a-service or SaaS and platform-as-a-service or SaaS.…

Ethics & Cyber Policy

Ethics & Cyber Policy

Cybersecurity policy makers and enforcers face ethical dilemmas that cover behavior and scope. The behavior of human professionals and organizations, as well as the scope of their actions and investigations, pose a challenge when determining the rights an individual or an organization may have. Organizations have the right to monitor…

SCADA and X.805 Framework

SCADA and X.805 Framework

The Importance of  SCADA Security SCADA systems are used to control critical areas such national infrastructure processeswhich include water, gas, and electrical power. SCADA systems are also used in facility and manufacturing processes. SCADA systems can be vulnerable to terrorist attacks. A successful attack can disrupt systems causing interrupted services…

IoT and Cyber Policy

IoT and Cyber Policy

Internet of Things (IoT) devices are a network of devices that can be accessed through the internet.These devices identify themselves and communicate through embedded technology. These devices and their networks can create vulnerabilities that can be exploited. Through these exploits, data can be stolen or devices hacked and controlled…

Biometrics and Access Control

Biometrics and Access Control

What is meant by “Multi-modal Biometrics” for access control? Multi-modal Biometrics refers to a technological system that offers more than one biometric option to scan for access. Multi-modal biometric solutions can provide different types of authentication options. Multi-modal biometric systems can require single factor biometrics for access or can require…

Close You've successfully subscribed to CyberSolace.io.
Close Great! You've successfully signed up.
Close Welcome back! You've successfully signed in.
Close Success! Your account is fully activated, you now have access to all content.
Close Success! Your billing info is updated.
Close Billing info update failed.