Management, compliance & auditing

Is Safe Harbor 2.0 Another Tug of War between Privacy and Security?

What led to the Safe Harbor's Demise? In Schrems v. Data Protection Commissioner, the Court of Justice of the European Union (also known as CJEU or ECJ) held

What Is SIEM?

A SIEM (security information and event management) is a software solution that normalizes, filters, correlates, assembles, and centrally manages other operat

The Cybersecurity Information Sharing Act of 2015 (CISA): Is It the Right Answer?

In attempt to further cybersecurity efforts for the nation, a brand new cybersecurity bill, the S. 754, has just been discussed: the Cybersecurity Informatio

Challenges Faced By CISOs: Balancing Security versus Manpower

Cybersecurity is not about buying the latest security monitoring and automation tools to solve the day-to-day problems. Government and banking organizati

How the SIEM Solution Can Help in Achieving PCI-DSS

[download]Download the BEST PRACTICES FOR DEVELOPING AN ENGAGING SECURITY AWARENESS PROGRAM whitepaper[/download] Learn the best practices for developing a s

Where do PCI-DSS and PII intersect?

Learn about PCI-DSS and how it helps protect sensitive customer information like personally identifiable information (PII).

Transition of ISO 27001: 2005 to ISO 27001: 2013

ISO 27001 is an international standard published by the International Standard Organization (ISO). This standard acts as a specification for an information s

PCI-DSS and PA-DSS

Today's online domain and a cashless way of transacting business have brought more players into the payment industry than yesterday. Cash is no longer consid

Cyber Security Risks in Supply Chain Management – Part 2

In Part 1 of this article series, I discussed various risks involved in supply chain management with the latest example of a malicious adware named "Superfis

Cyber Security Risk in Supply Chain Management: Part 1

Introduction Cyber security is generally thought of as various types of security devices like firewalls, Web Application Firewall (WAF), IDS/IPS, SIEM, DLP e