Management, compliance & auditing

Comparing endpoint security: EPP vs. EDR vs. XDR

What are EDR, EPP and XDR? What is EDR? Endpoint detection and response is a type of security solution that provides real-time visibility into endpoint act

Role and purpose of threat modeling in software development

Threat modeling and software development Threat modeling is an exercise designed to identify the potential cybersecurity threats and attack surface of an ap

5 changes the CPRA makes to the CCPA that you need to know

On election day 2020, Californians did more than vote for a president. They also passed the California Privacy Rights Act (CPRA), which clarified the Califor

6 benefits of cyber threat modeling

Continuing Infosec’s series on threat modeling, we are going to explore some of the biggest benefits organizations can realize from performing this important

What is threat modeling?

Introduction Everything that touches the internet or enterprise systems faces constant cyber threat from internal and external sources, malicious or mistake

First Safe Harbor, then Privacy Shield: What EU-US data-sharing agreement is next?

What is data sharing? The EU has become known internationally as an organization that takes data privacy very seriously. The EU’s stand-out data privacy law

How to make cybersecurity budget cuts without sacrificing security

Introduction 2020 has been an incredibly challenging year. Physical and mental health has taken a heavy toll; economies are under threat; and organizational

How to mitigate security risk in international business environments

Introduction Gone are the days when international business was a unicorn in the business world. Instead, “going international” is becoming more common, with

Security theatrics or strategy? Optimizing security budget efficiency and effectiveness

Introduction I am a staunch advocate of the consideration of human behavior in cybersecurity threat mitigation. The discipline of behavioral ecology is a goo

NY SHIELD Act: Security awareness and training requirements for New York businesses

Introduction The world of data protection and privacy regulations has brought us many laws and acts. The most commonly cited are the EU’s General Data Protec