Management, compliance & auditing
Management, compliance & auditing
The payment card industry (PCI) standard is a methodology used to ensure that customer data is protected such as credit cards and store transmissions of tran
February 20, 2015
Infosec
Management, compliance & auditing
When booking a hotel room, you assume that it is the responsibility of the hotel to keep you and your belongings safe by not sharing your room keys or other details. But a greater threat could be lurking in your room...
February 12, 2015
Dan Virgillito
Management, compliance & auditing
1. Introduction The European Union (EU) is a large politico-economic union consisting of 28 countries, having a total population of more than 500,000 million
February 02, 2015
Daniel Dimov
Management, compliance & auditing
Universities, colleges and other higher education institutions store PII (Personally Identifiable Information) such as credit card numbers, email addresses,
January 06, 2015
Dan Virgillito
Management, compliance & auditing
Investments in cybersecurity and physical security are proportionally connected to your organization's improved financial picture for a long-term perspective
December 02, 2014
Dan Virgillito
Management, compliance & auditing
As technology radically shapes the working environment of users across the globe, we are also responsible for keeping up with the security trends to avoid da
November 06, 2014
Dan Virgillito
Management, compliance & auditing
It sounds like the 90s sci-fi horror thriller, "Tremors". Unfortunately, today, it could easily be a headline from the recent space of distributed-denial-of-
October 29, 2014
Dan Virgillito
Management, compliance & auditing
Benjamin Franklin once said, "If you fail to plan, you plan to fail." This quote summarizes the importance of online encryption policy and hands-on implement
October 14, 2014
Dan Virgillito
Management, compliance & auditing
We live in a world that's becoming ever more dependent on the various digital products at our disposal. From the average man on the street making purchases o
October 07, 2014
Dan Virgillito
Management, compliance & auditing
By their nature, business endeavors involve various elements of risk. These elements may include technological, commercial, legal, financial, and environment
September 25, 2014
Kenneth LeeserIn this series
- The top security architect interview questions you need to know
- Top 10 cybersecurity best practices: Secure your organization’s data
- Is AI cybersecurity in your policies?
- Federal privacy and cybersecurity enforcement — an overview
- U.S. privacy and cybersecurity laws — an overview
- Common misperceptions about PCI DSS: Let’s dispel a few myths
- How PCI DSS acts as an (informal) insurance policy
- Keeping your team fresh: How to prevent employee burnout
- How foundations of U.S. law apply to information security
- Data protection Pandora's Box: Get privacy right the first time, or else
- Privacy dos and don'ts: Privacy policies and the right to transparency
- Starr McFarland talks privacy: 5 things to know about the new, online IAPP CIPT learning path
- Data protection vs. data privacy: What’s the difference?
- NIST 800-171: 6 things you need to know about this new learning path
- Working as a data privacy consultant: Cleaning up other people’s mess
- 6 ways that U.S. and EU data privacy laws differ
- Navigating local data privacy standards in a global world
- Building your FedRAMP certification and compliance team
- SOC 3 compliance: Everything your organization needs to know
- SOC 2 compliance: Everything your organization needs to know
- SOC 1 compliance: Everything your organization needs to know
- Overview: Understanding SOC compliance: SOC 1 vs. SOC 2 vs. SOC 3
- How to comply with FCPA regulation – 5 Tips
- ISO 27001 framework: What it is and how to comply
- Why data classification is important for security
- Threat Modeling 101: Getting started with application security threat modeling [2021 update]
- VLAN network segmentation and security- chapter five [updated 2021]
- CCPA vs CalOPPA: Which one applies to you and how to ensure data security compliance
- IT auditing and controls – planning the IT audit [updated 2021]
- Finding security defects early in the SDLC with STRIDE threat modeling [updated 2021]
- Cyber threat analysis [updated 2021]
- Rapid threat model prototyping: Introduction and overview
- Commercial off-the-shelf IoT system solutions: A risk assessment
- A school district's guide for Education Law §2-d compliance
- IT auditing and controls: A look at application controls [updated 2021]
- 6 key elements of a threat model
- Top threat modeling frameworks: STRIDE, OWASP Top 10, MITRE ATT&CK framework and more
- Average IT manager salary in 2021
- Security vs. usability: Pros and cons of risk-based authentication
- Threat modeling: Technical walkthrough and tutorial
- Comparing endpoint security: EPP vs. EDR vs. XDR
- Role and purpose of threat modeling in software development
- 5 changes the CPRA makes to the CCPA that you need to know
- 6 benefits of cyber threat modeling
- What is threat modeling?
- First Safe Harbor, then Privacy Shield: What EU-US data-sharing agreement is next?
- How to make cybersecurity budget cuts without sacrificing security
- How to mitigate security risk in international business environments
- Security theatrics or strategy? Optimizing security budget efficiency and effectiveness
- NY SHIELD Act: Security awareness and training requirements for New York businesses