CIS Controls, Security Program

Surviving Password Manager Data Breach

How your defense-in-depth strategy protected you from the LastPass data breach Most of us like using password managers for the security and user convenience. Password managers gave us a way to adhere to ever more complex password rules without having to keep track of them for

Read More

Threat Intelligence

Tips for Managing the Risks of Merges & Acquisition

Along with the benefits of capabilities and growth, mergers and acquisitions add new risks to your attack surface. Managing M&A risk should be part of your organization's overall risk management program. Mergers and acquisitions (M&As) are a

Read More

Threat Intelligence

Why did the DoD Introduce an updated Zero Trust Cybersecurity Framework

The concept of 'Zero Trust, ' which essentially presumes conventional perimeter protections don't exist, has been in cybersecurity for many years. Driven by the evolving threat landscape as well as maturing defensive frameworks, on November 22,

Read More

SOC2, Security Program

SOC 2 Perils and Pitfalls

Congratulations, product development was successful, and you have the utmost confidence in the capabilities of your new product or service. Engineering has assured you that the necessary controls are in place for secure operation. Sales demos are

Read More

Threat Intelligence

DDoS for the Holidays

Many find the holidays season exciting because they can relax, spend time with family and friends, and celebrate traditions. Additionally, most businesses have plenty to celebrate throughout the holidays since they usually have higher sales and

Read More

Security Program, Privacy

The Five-Step Adaptable Risk-based Privacy Program

In today's data-driven economy, an organization's data is its most valuable asset. The landscape of privacy regulations is vast and continuously evolving, forcing organizations to select and track applicable requirements for collecting and managing

Read More

Security Program, ISO27001

Scoping Your ISMS for ISO 27001 Compliance

The ISO 27001 standard provides requirements for establishing, implementing, maintaining and continually improving your Information Security Management System (ISMS) within the context of your organization. Your ISMS includes the people, processes

Read More

PCI DSS, Penetration Testing

Pentesting for PCI DSS

Most industry-recognized security frameworks, including HITRUST, CIS Controls and PCI DSS, stipulate penetration testing requirements as part of an organization's risk management cycle. In addition, the Payment Card Industry Security Standards

Read More

CISO, vCISO, Security Program

The Board vs. Security & Privacy Programs

In a corporation, the board is ultimately accountable to the shareholders for managing risks, including cybersecurity and privacy risk. Therefore, the need to address cybersecurity and privacy risk is generally accepted. However, there is often a

Read More

Privacy

Combined Risk Management for Security, Privacy and Compliance

Privacy regulations boil down to protecting information. In other words, privacy is about the security of data. The various privacy rights can be traced back to core security principles defined by NIST as Confidentiality, Integrity, and Availability

Read More