Management, compliance & auditing
 
    Management, compliance & auditing
Cyber insurance is also known as cyber liability insurance coverage. It helps businesses and individuals protect themselves from Internet- and IT infrastruct
 
                                January 05, 2018
Penny Hoelscher 
    Management, compliance & auditing
Risk – it’s an inherent part of doing business in any industry or niche. Risks exist in a myriad of forms, ranging from financial to cyber-attacks, and every
 
                                January 04, 2018
Infosec 
    Management, compliance & auditing
Before understanding the various methodologies and techniques for disaster recovery, it is essential to know what the term "disaster recovery" means in the f
 
                                December 15, 2017
Sayaala 
    Management, compliance & auditing
An essential part of a company's cybersecurity program is the creation and implementation of a workplace security policy, a document that outlines all plans
 
                                October 31, 2017
Daniel Brecht 
    Management, compliance & auditing
One of the earliest (a little bit intelligent) digital personal assistants was the annoying Microsoft Clippit, circa 1997. The animated MS Office paperclip w
 
                                August 31, 2017
Penny Hoelscher 
    Management, compliance & auditing
Cyber security is one of the most critical issues the U.S. faces today. The threats are real, and the need is pressing. The cyber security status is unstable
 
                                August 30, 2017
Irfan Shakeel 
    Management, compliance & auditing
1. Introduction Many small and large organizations prefer to download ready-made security policy templates instead of hiring experienced professionals for dr
 
                                May 24, 2017
Daniel Dimov 
    Management, compliance & auditing
1Section 1. Introduction Regional regulations on data transfers, such as the U.S.-E.U. Privacy Shield framework, have a significant impact on the cross-bord
 
                                April 19, 2017
Daniel Dimov 
    Management, compliance & auditing
Cyber security is one of the most critical issues the U.S. faces today. The threats are real, and the need is pressing. The cyber security status is unstable
 
                                March 30, 2017
Irfan Shakeel 
    Management, compliance & auditing
Section 1. Introduction Although there is a vast amount of information on the risks of cyber-attacks, not all businesses engage in preparation and implementa
 
                                February 24, 2017
Daniel DimovIn this series
- The top security architect interview questions you need to know
- Top 10 cybersecurity best practices: Secure your organization’s data
- Is AI cybersecurity in your policies?
- Federal privacy and cybersecurity enforcement — an overview
- U.S. privacy and cybersecurity laws — an overview
- Common misperceptions about PCI DSS: Let’s dispel a few myths
- How PCI DSS acts as an (informal) insurance policy
- Keeping your team fresh: How to prevent employee burnout
- How foundations of U.S. law apply to information security
- Data protection Pandora's Box: Get privacy right the first time, or else
- Privacy dos and don'ts: Privacy policies and the right to transparency
- Starr McFarland talks privacy: 5 things to know about the new, online IAPP CIPT learning path
- Data protection vs. data privacy: What’s the difference?
- NIST 800-171: 6 things you need to know about this new learning path
- Working as a data privacy consultant: Cleaning up other people’s mess
- 6 ways that U.S. and EU data privacy laws differ
- Navigating local data privacy standards in a global world
- Building your FedRAMP certification and compliance team
- SOC 3 compliance: Everything your organization needs to know
- SOC 2 compliance: Everything your organization needs to know
- SOC 1 compliance: Everything your organization needs to know
- Overview: Understanding SOC compliance: SOC 1 vs. SOC 2 vs. SOC 3
- How to comply with FCPA regulation – 5 Tips
- ISO 27001 framework: What it is and how to comply
- Why data classification is important for security
- Threat Modeling 101: Getting started with application security threat modeling [2021 update]
- VLAN network segmentation and security- chapter five [updated 2021]
- CCPA vs CalOPPA: Which one applies to you and how to ensure data security compliance
- IT auditing and controls – planning the IT audit [updated 2021]
- Finding security defects early in the SDLC with STRIDE threat modeling [updated 2021]
- Cyber threat analysis [updated 2021]
- Rapid threat model prototyping: Introduction and overview
- Commercial off-the-shelf IoT system solutions: A risk assessment
- A school district's guide for Education Law §2-d compliance
- IT auditing and controls: A look at application controls [updated 2021]
- 6 key elements of a threat model
- Top threat modeling frameworks: STRIDE, OWASP Top 10, MITRE ATT&CK framework and more
- Average IT manager salary in 2021
- Security vs. usability: Pros and cons of risk-based authentication
- Threat modeling: Technical walkthrough and tutorial
- Comparing endpoint security: EPP vs. EDR vs. XDR
- Role and purpose of threat modeling in software development
- 5 changes the CPRA makes to the CCPA that you need to know
- 6 benefits of cyber threat modeling
- What is threat modeling?
- First Safe Harbor, then Privacy Shield: What EU-US data-sharing agreement is next?
- How to make cybersecurity budget cuts without sacrificing security
- How to mitigate security risk in international business environments
- Security theatrics or strategy? Optimizing security budget efficiency and effectiveness
- NY SHIELD Act: Security awareness and training requirements for New York businesses