Blog
Insights for Reasonable Cyber Security and Compliance
What’s happening in the world of cybersecurity? How do you define 'reasonable' security controls? Which cyber threats can be prevented? What steps should you take to make your systems safer? Read our blog posts to gain new insights into cybersecurity news, security awareness, the latest threats and risks, penetration testing, compliance, regulations and so much more.
Risk Assessments
We’re getting more and more demand for Cyber Security Risk Assessments these days. What are they and what’s involved? (more…)
The Weakest Link Part II
Continuing on with the employee security awareness thought: the weakest link – the WSJ article discusses other areas. (more…)
The Weakest Link in Cyber Security
Another great article by WSJ – this one on information security and employee cyber security awareness. Because hackers today are so advanced, applying all the security solutions at our disposal and shoring up the perimeter isn’t enough anymore. (more…)
Placement of Exchange FE/CAS Servers in a PCI Compliant Environment ..Follow up
And a follow-up…(Servers in a PCI Compliant Environment)
Hello-
So I was the individual who wrote up this question initially and I do have some followup questions. I read about the MS recommendation of deploying in ISA server along with the CAS server to provide the necessary security – but I guess I was looking for a different solution that didn’t involve deploying a horrible Microsoft product to solve their forced insecure architectural problem. (more…)
Security Testing Terms — Are we talking about the same thing?
Sometimes when I’m talking with organizations about their security testing needs, there is some confusion between what constitutes a vulnerability scan, a penetration test, and a web application assessment. (more…)
Advanced Malware Threats – Are You Protected?
Advanced Malware Threats or Advanced Persistent Threats are becoming more and more common in security breaches these days. What are they and what makes them so difficult to combat? (more…)
In the event of a breach…
Saw a great WSJ article recently on steps to take if you’ve been breached. Well written! Here’s the Cliff Notes version: (more…)
Consumer Loyalty and Data Breaches
A recent article on darkreading.com showed results of a survey on consumer loyalty and data breaches called SailPoint Market Pulse Survey, conducted online by Harris Interactive. (more…)
Placement of Exchange FE/CAS Servers in a PCI Compliant Environment
A client asked a great question, and I wanted to share this with others who may be facing the same challenge… (more…)
Who’s Storing Your Sensitive Data?
In the spirit of keeping sensitive data safe, and our private lives private, I was a little disturbed by a recent article I found on Wired News. They are referencing a newly released Dept. of Justice memo which outlines the retention periods for major Telecoms on data they’re storing about your: texting – detail/content; IP session and destination information; call details, etc. (more…)