PCI Compliance – It’s not just for today
Read an article recently on study that was comparing organizations that had achieved PCI Compliance, but that when re-visited a year later, had fallen out of compliance.
Read an article recently on study that was comparing organizations that had achieved PCI Compliance, but that when re-visited a year later, had fallen out of compliance.
We’re getting more and more demand for Cyber Security Risk Assessments these days. What are they and what’s involved?
Continuing on with the employee security awareness thought: the weakest link – the WSJ article discusses other areas.
Another great article by WSJ – this one on information security and employee cyber security awareness. Because hackers today are so advanced, applying all the security solutions at our disposal and shoring up the perimeter isn’t enough anymore.
Sometimes when I’m talking with organizations about their security testing needs, there is some confusion between what constitutes a vulnerability scan, a penetration test, and a web application assessment.
Advanced Malware Threats or Advanced Persistent Threats (APT) are becoming more and more common in security breaches these days. What are they and what makes them so difficult to combat?
Saw a great WSJ article recently on steps to take if you’ve been breached. Well written! Here’s the Cliff Notes version:
A recent article on darkreading.com showed results of a survey on consumer loyalty and data breaches called SailPoint Market Pulse Survey, conducted online by Harris Interactive.
In the spirit of keeping sensitive data safe, and our private lives private, I was a little disturbed by a recent article I found on Wired News. They are referencing a newly released Dept. of Justice (DoJ) memo which outlines the retention periods for major Telecoms on data they’re storing about your: texting – detail/content; […]
Systems and Architecture Review. So, you’re feeling pretty confident that you’ve got your environment locked down. Are you certain your infrastructure, servers, and devices deployed throughout your organization are protecting the confidentiality, integrity, and availability of your sensitive information assets?