Management, compliance & auditing

The essentials of an acceptable use policy

What is an acceptable use policy? An Acceptable Use Policy (henceforward mentioned as "AUP") is agreement between two or more parties to a computer network

Want to Limit PCI DSS Scope? Use Tokenization

Every organization should follow a proactive rather than a reactive approach to protect against threats, risks and vulnerabilities, to which if their IT infr

Cyber Insurance

Introduction Cyber insurance coverage has been available on the market for a decade, but only recently companies have been seeing a significant growth—sales

Bringing Down Security Risks With A BYOD Encryption Policy

The number of employees using their personal devices for work-related purposes is absurd. Let's just say there's an employee or two in every organization usi

File integrity monitoring (FIM) and PCI-DSS

In this article, we will learn about the requirement of file integrity monitoring in PCI-DSS (Payment Card Industry Data Security Standard). If we talk about

Key Elements of an E-mail Retention Policy

1. What is an E-mail Retention Policy? Simply put, an e-mail retention policy/ERP is the process of keeping emails for compliance or business reasons. It dif

Data Access Governance: Security's Biggest Unaddressed To-Do

If you are like me, there are many things you can check off your to-do list every day. However, if you are really like me, then there are some things which s

PCI-DSS 3.0 - Key Drivers

Every organization should follow a proactive rather than a reactive approach to protect against threats, risks, and vulnerabilities to which if their IT infr

Qualitative risk analysis with the DREAD model

This article introduces two types of risk analysis (quantitative, qualitative) and presents how to perform qualitative risk analysis with the DREAD model. Fi

Information Security Policies

Organisations are giving more priority to development of information security policies, as protecting their assets is one of the prominent things that needs