Management, compliance & auditing
Management, compliance & auditing
What are EDR, EPP and XDR? What is EDR? Endpoint detection and response is a type of security solution that provides real-time visibility into endpoint act
December 23, 2020
Gilad Maayan
Management, compliance & auditing
Threat modeling and software development Threat modeling is an exercise designed to identify the potential cybersecurity threats and attack surface of an ap
December 22, 2020
Howard Poston
Management, compliance & auditing
On election day 2020, Californians did more than vote for a president. They also passed the California Privacy Rights Act (CPRA), which clarified the Califor
December 21, 2020
Karen Walsh
Management, compliance & auditing
Continuing Infosec’s series on threat modeling, we are going to explore some of the biggest benefits organizations can realize from performing this important
December 02, 2020
Patrick Mallory
Management, compliance & auditing
Introduction Everything that touches the internet or enterprise systems faces constant cyber threat from internal and external sources, malicious or mistake
December 01, 2020
Patrick Mallory
Management, compliance & auditing
What is data sharing? The EU has become known internationally as an organization that takes data privacy very seriously. The EU’s stand-out data privacy law
November 12, 2020
Susan Morrow
Management, compliance & auditing
Introduction 2020 has been an incredibly challenging year. Physical and mental health has taken a heavy toll; economies are under threat; and organizational
November 11, 2020
Susan Morrow
Management, compliance & auditing
Introduction Gone are the days when international business was a unicorn in the business world. Instead, “going international” is becoming more common, with
October 27, 2020
Greg Belding
Management, compliance & auditing
Introduction I am a staunch advocate of the consideration of human behavior in cybersecurity threat mitigation. The discipline of behavioral ecology is a goo
September 22, 2020
Susan Morrow
Management, compliance & auditing
Introduction The world of data protection and privacy regulations has brought us many laws and acts. The most commonly cited are the EU’s General Data Protec
September 21, 2020
Susan MorrowIn this series
- The top security architect interview questions you need to know
- Top 10 cybersecurity best practices: Secure your organization’s data
- Is AI cybersecurity in your policies?
- Federal privacy and cybersecurity enforcement — an overview
- U.S. privacy and cybersecurity laws — an overview
- Common misperceptions about PCI DSS: Let’s dispel a few myths
- How PCI DSS acts as an (informal) insurance policy
- Keeping your team fresh: How to prevent employee burnout
- How foundations of U.S. law apply to information security
- Data protection Pandora's Box: Get privacy right the first time, or else
- Privacy dos and don'ts: Privacy policies and the right to transparency
- Starr McFarland talks privacy: 5 things to know about the new, online IAPP CIPT learning path
- Data protection vs. data privacy: What’s the difference?
- NIST 800-171: 6 things you need to know about this new learning path
- Working as a data privacy consultant: Cleaning up other people’s mess
- 6 ways that U.S. and EU data privacy laws differ
- Navigating local data privacy standards in a global world
- Building your FedRAMP certification and compliance team
- SOC 3 compliance: Everything your organization needs to know
- SOC 2 compliance: Everything your organization needs to know
- SOC 1 compliance: Everything your organization needs to know
- Overview: Understanding SOC compliance: SOC 1 vs. SOC 2 vs. SOC 3
- How to comply with FCPA regulation – 5 Tips
- ISO 27001 framework: What it is and how to comply
- Why data classification is important for security
- Threat Modeling 101: Getting started with application security threat modeling [2021 update]
- VLAN network segmentation and security- chapter five [updated 2021]
- CCPA vs CalOPPA: Which one applies to you and how to ensure data security compliance
- IT auditing and controls – planning the IT audit [updated 2021]
- Finding security defects early in the SDLC with STRIDE threat modeling [updated 2021]
- Cyber threat analysis [updated 2021]
- Rapid threat model prototyping: Introduction and overview
- Commercial off-the-shelf IoT system solutions: A risk assessment
- A school district's guide for Education Law §2-d compliance
- IT auditing and controls: A look at application controls [updated 2021]
- 6 key elements of a threat model
- Top threat modeling frameworks: STRIDE, OWASP Top 10, MITRE ATT&CK framework and more
- Average IT manager salary in 2021
- Security vs. usability: Pros and cons of risk-based authentication
- Threat modeling: Technical walkthrough and tutorial
- Comparing endpoint security: EPP vs. EDR vs. XDR
- Role and purpose of threat modeling in software development
- 5 changes the CPRA makes to the CCPA that you need to know
- 6 benefits of cyber threat modeling
- What is threat modeling?
- First Safe Harbor, then Privacy Shield: What EU-US data-sharing agreement is next?
- How to make cybersecurity budget cuts without sacrificing security
- How to mitigate security risk in international business environments
- Security theatrics or strategy? Optimizing security budget efficiency and effectiveness
- NY SHIELD Act: Security awareness and training requirements for New York businesses