Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Posts

How does risk management reduce the impact of a cyber attack?

What do healthcare, banking, and the insurance industry all have in common? RISK! Regardless of industry, having an application, or system compromised could mean the exposure of extremely sensitive information. If such information became public knowledge your business could suffer tremendously. For many companies, a data breach is the worst possible situation imaginable. How does an organization work to reduce the impact of a system being compromised?

Signs Your Organization Needs a GRC Solution

Before beginning, you might ask yourself: Does my organization need a GRC Solution? The simple answer is yes. There are over 200 complex frameworks and workflows that simply can’t be managed by floods of repetitious spreadsheets or word documents. Let’s define “Governance Risk-Management Compliance” and how the three pillars work together in relation to an organization and its objectives. Check top 30 security frameworks – 2019.

FedRAMP Pentesting Requirements

If you’re doing business in the cloud, odds are you know a thing or two about compliance maintenance. This article highlights The Federal Risk and Authorization Management Program (FedRAMP) and explains how this certification stands out from the rest by not being another just another check here for compliance standard. So, what is FedRAMP?

What is Risk Exception

A business wants to hire a vendor. However, this vendor does not meet policy standards and has requested an exception. The question you face is whether or not to approve or deny that exception request. What’s good for business sometimes comes with added risk. In fact, many incidents are the direct result of a policy violation. For risk management, and business needs, maybe the answer isn’t a simple yay or nay but a more nuanced approach.

Top 7 Healthcare Cybersecurity Frameworks

Today, the healthcare industry has become prone to cyber-attacks, just like in any other sector. One notable fact within all those fields is the similarities in existing as well as emerging threats. At the same time, there is an increasing need for organizations to reassure their customers and regulators that their networks and systems have incorporated adequate security measures. One way of achieving this goal includes complying with various recognized security standards and frameworks.

CISOs Ultimate Guide For Top 30 Security Control Frameworks - 2019

Companies in highly regulated industries are forced to adopt one or more frameworks in order to meet compliance initiatives. There are over 200 security frameworks, regulations, standards and guidelines to choose from that could impact your business at any given time. In no particular order, below are the top security controls frameworks that are pervasive throughout our security industry along with some unique facts about each framework.

We are compliant why do we need a security program?

Often in the realm of IT management, the thought of IT compliance is associated with information security. This is unfortunately not the case as they are two very different things. In this article, we will simplify compliance, and discuss why a pro-active security program is the ideal approach for modern business practice.

How Not To Become a Target With Enough for Two Lines or Even Three

In mid-November last year, the retail giant Target experienced a security breach where customers’ credit card information was stolen. At first, it was thought that 40 million users had been affected but by January 2014, those numbers skyrocketed to a stunning 100 million. What emerged was the story of hackers who had appeared as “the good guys” in order to harvest as much information as they could from Target’s network.

State Security Breach Notification Laws

A security breach is defined as any unauthorized access or acquisition that compromises the security, confidentiality, integrity or availability of covered information, systems, and applications. Recent years have seen significant amounts of legislative activity related to state data breach notification laws. South Dakota and Alabama enacted new data breach notification laws in 2019, becoming the last of 50 U.S. states to enact such laws.