Skip to content
  • What We Do
  • About Us
  • Our People
  • The Blog
  • Contact Us

The Blog

News & Thoughts from the Axenic Team

Category: Blog

If you are not measuring it, you are not managing it.

By Tony, on 9 July, 2014

In my last article I spoke at some length about not just why a Security Policy is important, what its content should be, but also how it should be written. There is no default setting for Security Policy. Remember, what works for one organisation probably won’t work for another.

Read More

Information Security Management Systems – It’s all about the Business!

By Admin, on 25 May, 2014

An Information Security Management System (ISMS) is a security framework comprised of policies, processes and the management of technologies to address an organisation’s information security requirements.

Read More


Using Logical Trust Domains to understand DNSSEC

By Admin, on 12 April, 2014

The implementation of DNSSEC has been gaining momentum recently as organisations and vendors implement and make available the systems and tools required to ensure the integrity of the DNS lookup process.

Read More

Better Security Policy Leads To Greater Compliance

By Tony, on 26 March, 2014

It is a long-standing principle that all organisations, from the large multi-national to the small business, need and should have some kind of security policy.

Read More


Using Sampling To Ensure Effective Audit, Certification and Accreditation.

By Monique, on 11 March, 2014

At Axenic, we have two ISO 27001 Lead auditors and perform a significant number of certification reviews for NZ government agencies. One of the common challenges of auditing is selecting which controls (both procedural and technical) to assess when a client has a limited time-frame or budget.

Read More

Highlights from the Verizon 2014 PCI Compliance Report

By Chris, on 18 February, 2014

Verizon has published its 2014 PCI Compliance Report, which can be downloaded from here. Like their Data Breach Investigation Report (DBIR) it is an excellent piece of research and provides insight into the challenges associated with complying with the Payment Card Industry’s Data Security Standard (PCI DSS) v2.0.

Read More


Posts navigation

Older posts
Newer posts

Search The Blog

Browse By Category

  • Assurance
  • Audit
  • Audit Sample
  • Auditing
  • Blog
  • Certification
  • Cloud
  • Cloud Computing
  • Compliance
  • COSAC
  • CSIRT
  • Data Breach
  • Enterprise Security Architecture
  • Fear Uncertainty and Doubt
  • Gamification
  • Governance
  • ICS
  • Incident
  • Incident Management
  • Incident Management and Response
  • Incident Response
  • Incident Response and Management
  • Industrial Control Systems
  • Information Security
  • Information Security Management System
  • Interest
  • ISMS
  • ISO 27001
  • Measurement
  • Metrics
  • News
  • News Archive
  • Opinion
  • Passwords
  • PCI DSS
  • Presentations
  • Privacy
  • Project Management
  • Projects
  • Protective Security Requirements
  • PSR
  • Rant
  • Risk
  • Risk Assessment
  • Risk Management
  • SABSA
  • SCADA
  • Security
  • Security Architecture
  • Security Metrics
  • Service Design
  • Supervisory Control and Data Acquisition
  • Training
  • Trust Modelling
  • Home
  • What we do
    • Governance
    • Risk
    • Assurance
    • Architecture
    • Training
  • About us
    • Our people
    • Careers
  • Blog
  • Contact us

Follow Us:

LinkedIn Google Plus Twitter
Axenic © Copyright 2018 Axenic Ltd. All Rights Reserved.

Privacy Policy