Blog

Threat Intelligence

DDoS for the Holidays

Many find the holidays season exciting because they can relax, spend time with family and friends, and celebrate traditions. Additionally, most businesses have plenty to celebrate throughout the holidays since they usually have higher sales and acquire more recognition.

Read More

Security Program, Privacy

The Five-Step Adaptable Risk-based Privacy Program

In today's data-driven economy, an organization's data is its most valuable asset. The landscape of privacy regulations is vast and continuously evolving, forcing organizations to select and track applicable requirements for collecting and managing

Read More

Security Program, ISO27001

Scoping Your ISMS for ISO 27001 Compliance

The ISO 27001 standard provides requirements for establishing, implementing, maintaining and continually improving your Information Security Management System (ISMS) within the context of your organization. Your ISMS includes the people, processes

Read More

PCI DSS, Penetration Testing

Pentesting for PCI DSS

Most industry-recognized security frameworks, including HITRUST, CIS Controls and PCI DSS, stipulate penetration testing requirements as part of an organization's risk management cycle. In addition, the Payment Card Industry Security Standards

Read More

CISO, vCISO, Security Program

The Board vs. Security & Privacy Programs

In a corporation, the board is ultimately accountable to the shareholders for managing risks, including cybersecurity and privacy risk. Therefore, the need to address cybersecurity and privacy risk is generally accepted. However, there is often a

Read More

CISO, vCISO, Security Program

Finding Peace of Mind in Cybersecurity

Everyone is aware Cybersecurity is a necessity. And regardless of how mature or lacking your current cybersecurity program is, the constantly changing landscape makes it challenging to stay on top of. From potential concerns related to an economic

Read More

Privacy

Combined Risk Management for Security, Privacy and Compliance

Privacy regulations boil down to protecting information. In other words, privacy is about the security of data. The various privacy rights can be traced back to core security principles defined by NIST as Confidentiality, Integrity, and Availability

Read More

Security Program, Privacy

Three Essential Elements of an Adaptable Risk-Based Privacy Program

Given the complexity and cost of security, privacy and compliance efforts, a comprehensive risk management program is the best overall approach. A combined program helps reduce duplicate efforts and optimizes the ability to adapt to changes.

Read More

Security Program, HITRUST

Is HITRUST just for Healthcare or Everybody?

The Health Information Trust Alliance (HITRUST) Common Security Framework (CSF) is a widely recognized security framework that HITRUST developed in 2007 to provide a roadmap to compliance for programs like ISO/IEC 27001 and HIPAA. HITRUST CSF

Read More

Penetration Testing, Security Program

The Top Five Criteria for Selecting Your Penetration Testing Vendor

The ROI on Pen Testing varies widely depending on the vendor you choose. Here are some tips for making a smart choice. Penetration testing also known as offensive security testing, is in high demand due to the unquenchable need for continuous

Read More