Management, compliance & auditing
Management, compliance & auditing
Information security (IS) is a critical part of any small scale company and a big enterprise, and a challenge for any firm. Information security involves ver
March 27, 2014
Chintan Gurjar
Management, compliance & auditing
Application Whitelisting is a technology that has been in use in the security world for quite a long time. For those who may not already be familiar with AWL
February 19, 2014
John Fox
Management, compliance & auditing
Introduction In this article we'll present the open source host-based intrusion detection system, which is needed if we would like to detect host-based attac
January 02, 2014
Dejan Lukan
Management, compliance & auditing
An enterprise invests considerable amount of time in its day to day scanning and managing patched for the infrastructure. But, an enterprise psychological an
September 26, 2013
Karthik
Management, compliance & auditing
Introduction "Conditional complexity" (also called cyclomatic complexity) is a term used to measure the complexity of software. The term refers to the numbe
September 20, 2013
Robert Barnes
Management, compliance & auditing
Image courtesy of Gualberto107 / FreeDigitalPhotos.net [pkadzone zone="main_top"] Introduction Cyber policy is an important issue that many would qualify
August 28, 2013
Dimitar Kostadinov
Management, compliance & auditing
1. Introduction A patent is defined as an exclusive right or rights provided by a government to an inventor for a certain period of time in exchange for the
April 19, 2013
Daniel Dimov
Management, compliance & auditing
An organization is a complex structure. We can set up frameworks, lay out processes and chart our policies and procedures to be followed; however, in practic
March 04, 2013
arD3n7
Management, compliance & auditing
To an organization that is serious about security and wants to identify the most efficient way to invest in security solutions, a risk assessment is absolute
February 14, 2013
Jesse Valentin
Management, compliance & auditing
Everything we do in the Internet leaves digital fingerprints. Therefore, it is only logical that many web users are worried about the issue of privacy. Their
January 10, 2013
Daniel DimovIn this series
- The top security architect interview questions you need to know
- Top 10 cybersecurity best practices: Secure your organization’s data
- Is AI cybersecurity in your policies?
- Federal privacy and cybersecurity enforcement — an overview
- U.S. privacy and cybersecurity laws — an overview
- Common misperceptions about PCI DSS: Let’s dispel a few myths
- How PCI DSS acts as an (informal) insurance policy
- Keeping your team fresh: How to prevent employee burnout
- How foundations of U.S. law apply to information security
- Data protection Pandora's Box: Get privacy right the first time, or else
- Privacy dos and don'ts: Privacy policies and the right to transparency
- Starr McFarland talks privacy: 5 things to know about the new, online IAPP CIPT learning path
- Data protection vs. data privacy: What’s the difference?
- NIST 800-171: 6 things you need to know about this new learning path
- Working as a data privacy consultant: Cleaning up other people’s mess
- 6 ways that U.S. and EU data privacy laws differ
- Navigating local data privacy standards in a global world
- Building your FedRAMP certification and compliance team
- SOC 3 compliance: Everything your organization needs to know
- SOC 2 compliance: Everything your organization needs to know
- SOC 1 compliance: Everything your organization needs to know
- Overview: Understanding SOC compliance: SOC 1 vs. SOC 2 vs. SOC 3
- How to comply with FCPA regulation – 5 Tips
- ISO 27001 framework: What it is and how to comply
- Why data classification is important for security
- Threat Modeling 101: Getting started with application security threat modeling [2021 update]
- VLAN network segmentation and security- chapter five [updated 2021]
- CCPA vs CalOPPA: Which one applies to you and how to ensure data security compliance
- IT auditing and controls – planning the IT audit [updated 2021]
- Finding security defects early in the SDLC with STRIDE threat modeling [updated 2021]
- Cyber threat analysis [updated 2021]
- Rapid threat model prototyping: Introduction and overview
- Commercial off-the-shelf IoT system solutions: A risk assessment
- A school district's guide for Education Law §2-d compliance
- IT auditing and controls: A look at application controls [updated 2021]
- 6 key elements of a threat model
- Top threat modeling frameworks: STRIDE, OWASP Top 10, MITRE ATT&CK framework and more
- Average IT manager salary in 2021
- Security vs. usability: Pros and cons of risk-based authentication
- Threat modeling: Technical walkthrough and tutorial
- Comparing endpoint security: EPP vs. EDR vs. XDR
- Role and purpose of threat modeling in software development
- 5 changes the CPRA makes to the CCPA that you need to know
- 6 benefits of cyber threat modeling
- What is threat modeling?
- First Safe Harbor, then Privacy Shield: What EU-US data-sharing agreement is next?
- How to make cybersecurity budget cuts without sacrificing security
- How to mitigate security risk in international business environments
- Security theatrics or strategy? Optimizing security budget efficiency and effectiveness
- NY SHIELD Act: Security awareness and training requirements for New York businesses