Blog

Penetration Testing, Security Program, Risk Assessment

The Marriott Hack: A Cautionary Tale for Corporate Acquisitions

The case of the Marriott hack is, at once, an alarming prospect for the chain’s previous guests and an invaluable case study for any organization involved in any kind of merger. At the very least, it serves as a cautionary tale for businesses that ignore their due diligence in

Read More

PCI DSS, Security Program

I never touch Cardholder Data - Does PCI DSS Apply to me?

Payment cards have been around a long time, and nefarious schemes to take advantage of them have been around almost as long. Since most people do not read the legal agreements they sign up to, they are unaware of their real responsibilities towards

Read More

PCI DSS

5 Tips for Becoming PCI DSS Compliant

The Payment Card Industry Data Security Standard (PCI DSS) is required by contract for those handling cardholder data, whether you are a startup or a global enterprise.

Read More

Risk Assessment

7 IT Security Risk Assessment Myths Debunked

Though the use of security risk assessments is widespread, often because they are mandated by compliance standards, there are a number of false assumptions about them that simply aren’t true. These misconceptions often center around confusion about

Read More

Risk Assessment

How to Prepare for an Information Security Risk Assessment

It’s finally time for the security risk assessment you’ve been pushing off… You may have been delaying because you believe risk assessments aren’t really valuable— that you just have to perform one for compliance or that it’s only going to tell you

Read More

Risk Assessment

How to Actually Use Your Security Risk Assessment Report

You just received the results from your security risk assessment, but now what? It’s not uncommon for companies to perform this analysis only to check the compliance checkbox and never do anything with the results. Don’t just file your risk

Read More

Risk Assessment

How to Identify Your Security Risks & Develop a Plan You Can Afford

When it comes to conducting security risk assessments, it can be difficult knowing where to get started. Even after identifying your scope and assets, there are a number of vulnerabilities and threats to be considered. Add some structure to your

Read More

CISO, vCISO

The Advantages of Hiring a vCISO Vendor vs. an In-House CISO

You need someone to manage your business’ security program, and while this is a necessity, you have options for how you choose to protect your assets. For most companies, they either hire a Chief Information Security Officer (CISO) to manage an

Read More

CISO, vCISO

5 Signs It's Time to Start Using a CISO as a Service

You’re busy at work, focused on meeting daily deadlines and on achieving your overall mission. But while you’re laser-focused on your day-to-day tasks and long-term goals, who’s worrying about your cybersecurity? Maybe it’s a small in-house IT team

Read More

CISO, vCISO

5 Ways vCISO Can Turbocharge Your Sales Team

Sales are complicated. You’re not just articulating the facts about your product or service, you are also navigating emotions and perception to get the deal closed. In a tech setting, that’s about building trust and confidence. The faster that trust

Read More