Management, compliance & auditing

Time to update your cybersecurity policy?

Introduction In today’s highly connected world, new cyberthreats and risks emerge seemingly every hour, around the clock. Whether it is from spearphishing, a

Ultimate guide to international data protection and privacy laws

Introduction  Human beings have many things in common and we all live in one world, together. However, when it comes to data privacy laws, the saying “there

Why your security risk management program should include legacy systems

Introduction The aim of business is to be profitable — and as we all know, investing in new systems, devices, and technology costs money that may otherwise b

Top 6 cybersecurity books for IT auditors

Introduction Like many other information security professionals, you probably have a library of books on the topic of your career choice. Not only that, but

Key elements of an information security policy

An information security policy is a set of rules enacted by an organization to ensure that all users of networks or the IT structure within the organization’

Critical security concerns for the financial services industry

Compliance regulations in the financial services industry  The financial services industry is heavily regulated with compliance requirements focusing on the

Critical security concerns facing government

Challenge 1: Staying compliant If the government enforces regulations, then its various departments and functions must also comply with those same regulation

Security first: Compliance by design

Introduction Whether it’s the General Data Protection Regulation (GDPR) or the New York Stop Hacks and Improve Electronic Data Security Act (NY SHIELD), near

What companies need to know about proposed changes to the Gramm-Leach-Bliley Act

Introduction: What is the Gramm-Leach-Bliley Act (GLBA)? Also called the Financial Modernization Act of 1999, GLBA governs the way in which financial institu

Secure process audit

Introduction A secure process audit is a type of security audit in which the tester (auditor) tests the application or server or any network device where he