News and Events
ICSA Labs will be issuing Excellence in Information Security Testing (EIST) awards on Monday, April 20 at 6pm PST in the Verizon Booth (N3101) at the RSA Conference in San Francisco. The awards recognize clients that have achieved successful completion of 10, 15, or 20 years of continuous ICSA Labs information security testing.
When it comes to security, many vendors consider certification of its products by an independent organization an option, not a requirement. However, third party testing is an important element when a company is deciding on technology solutions that are part of its security management program.
Prepare your enterprise to conduct individualized self-assessments of risk, so you can make realistic decisions on how to avoid cyber threats. The 2015 DBIR expands its investigation into nine common threat patterns and sizes up the effects of all types of data breaches, from small data disclosures to events that hit the headlines.
Someone has to take responsibility for the security and privacy issues attendant to the Internet of Things. In this guest essay posted on ThirdCertainty, George Japak, managing director of ICSA Labs, a vendor-neutral testing and certification organization, outlines who that should be.
Congratulations to Barracuda Networks, Cyberoam Technologies, F5 Networks, MicroWorld Technologies and Sophos!
George Japak, managing director of ICSA Labs and Verizon’s HIPAA security officer, discusses his thoughts on NCSA month and offers important advice to help enterprises and consumers stay vigilant when it comes to cybersecurity.
George Japak, managing director of ICSA Labs, discusses testing, certification and security challenges in a Q&A interview with Infosecurity Professional's Joyce Chutchian.
The worst hack is the one you don’t know about
One thing that’s clear is that viruses evolve in distinct ages and follow patterns. They come into existence in response to some new technology then spread and cause mischief for some years until an extinction-level event occurs and wipes them out briefly. That is, until a new technology breathes life into them again...
Constant Connectivity, Proliferation of Mobile Devices and Applications Will Create More Security Concerns in 2012
ICSA Labs recommends that businesses and consumers guard against 13 security threats in 2012...