Blog
Insights for Reasonable Cyber Security and Compliance
What’s happening in the world of cybersecurity? How do you define 'reasonable' security controls? Which cyber threats can be prevented? What steps should you take to make your systems safer? Read our blog posts to gain new insights into cybersecurity news, security awareness, the latest threats and risks, penetration testing, compliance, regulations and so much more.
Infosecurity ISACA Conference 2019: Next Gen Risk Assessment
ISACA North America 2019 Next Gen Risk Assessment
A discussion of the new Duty of Care Risk Assessment methodology (DoCRA) also known as the Center for Internet Security Risk Assessment Method (CIS RAM). Discuss what sets this method apart and why it is an important business tool. (more…)The Sedona Conference Working Group 11 Meeting 2019 on Reasonable Security
This September, a panel of Data Security and Privacy Liability – Working Group 11 (WG11) members led a dialogue with WG11 members at the 2019 midyear meeting: Proactive privacy and security governance: Complying with global data privacy and security regulations (more…)
Third-Party Vendors: Are You on the Same Page?
Your Vendors May Be Weak Links in Supply Chain Breaches
(more…)Cyber Security Summit Chicago – Reasonable Security in The Age of Risk
The Cyber Security Summit began with a speaker from the Department of Justice, and it ended with a speaker from the FBI – presenting on risks and reasonable protocol. (more…)
Why You Need to Take an Active Role in Your AWS Cloud Environment – One of the Largest Data Breaches
CLOUD ENVIRONMENT: The Capital One incident is one of the largest data breaches of all time, involving 100 million credit card applications and 140,000 Social Security numbers; the bank’s stock market price took an immediate hit as company executives and IT personnel began scrambling to implement the firm’s incident response plan. (more…)
Migrating Your Legacy Firewall to a Next Generation Firewall
Every organization today needs a multi-layer security strategy to protect its enterprise from the multitude of cyber security threats that exist today; While one cannot underestimate the importance of an email security gateway, web filtering solution, or endpoint protection system, there is no question as to the prominence of an enterprise firewall. (more…)
Does Colorado Protections for Consumer Data Privacy Affect You?
If you are a business in the United States, or anywhere for that matter, its time to start taking notice at where your consumers are located; Because compliance regulations such as those implemented by the European Union, California and Colorado may apply to your organization if you hold the personal information and data of people located in those jurisdictions. (more…)
Cyber Security Policies & Strategies Forum: SCPHCA
HALOCK Security Labs led the Cyber Security forum for the South Carolina Primary Health Care Association (SCPHCA). Managing consultants, Tod Ferran, CISSP, QSA, ISO 27001 Lead Auditor, and Glenn A. Stout, Ph.D., CISSP, CISM, GSEC, PMP presented on hot topics. (more…)