Management, compliance & auditing
Management, compliance & auditing
Learn about what a cyberthreat is.
May 13, 2021
Patrick Mallory
Management, compliance & auditing
Choosing a form of threat modeling can help protect your organization from security threats.
April 19, 2021
Patrick Mallory
Management, compliance & auditing
The rise of the Internet of Things (IoT) The Internet of Things (IoT) is growing rapidly. IoT devices provide convenience and can be a more efficient and co
March 11, 2021
Howard Poston
Management, compliance & auditing
During the 2014-2105 fiscal year, the New York State Education Department enacted Education Law §2-d, which includes a series of provisions designed to enhan
March 09, 2021
Patrick Mallory
Management, compliance & auditing
Portions of this article, including many of the definitions and terminology, have been sourced and summarized from ISACA.org and course materials published b
March 09, 2021
Kenneth Magee
Management, compliance & auditing
How to identify threats and discover vulnerabilities with threat modeling Threat modeling is a process for threat discovery and risk management. Any system
February 15, 2021
Howard Poston
Management, compliance & auditing
Threat modeling is an exercise designed to identify the potential threats and attack vectors that exist for a system. Based upon this information, it is poss
February 11, 2021
Howard Poston
Management, compliance & auditing
IT management is a competitive career opportunity. Some companies hire from within, but you can still find job opportunities from IT firms looking for qualif
February 02, 2021
Infosec Institute
Management, compliance & auditing
Introduction Risk-based authentication (RBA) has to become part of the enterprise lexicon for a good reason. The authentication measures used to protect acc
February 01, 2021
Susan Morrow
Management, compliance & auditing
Threat modeling tutorial: What to know before you begin Threat modeling is an exercise designed to help an organization identify potential threats and cyber
January 11, 2021
Howard PostonIn this series
- The top security architect interview questions you need to know
- Top 10 cybersecurity best practices: Secure your organization’s data
- Is AI cybersecurity in your policies?
- Federal privacy and cybersecurity enforcement — an overview
- U.S. privacy and cybersecurity laws — an overview
- Common misperceptions about PCI DSS: Let’s dispel a few myths
- How PCI DSS acts as an (informal) insurance policy
- Keeping your team fresh: How to prevent employee burnout
- How foundations of U.S. law apply to information security
- Data protection Pandora's Box: Get privacy right the first time, or else
- Privacy dos and don'ts: Privacy policies and the right to transparency
- Starr McFarland talks privacy: 5 things to know about the new, online IAPP CIPT learning path
- Data protection vs. data privacy: What’s the difference?
- NIST 800-171: 6 things you need to know about this new learning path
- Working as a data privacy consultant: Cleaning up other people’s mess
- 6 ways that U.S. and EU data privacy laws differ
- Navigating local data privacy standards in a global world
- Building your FedRAMP certification and compliance team
- SOC 3 compliance: Everything your organization needs to know
- SOC 2 compliance: Everything your organization needs to know
- SOC 1 compliance: Everything your organization needs to know
- Overview: Understanding SOC compliance: SOC 1 vs. SOC 2 vs. SOC 3
- How to comply with FCPA regulation – 5 Tips
- ISO 27001 framework: What it is and how to comply
- Why data classification is important for security
- Threat Modeling 101: Getting started with application security threat modeling [2021 update]
- VLAN network segmentation and security- chapter five [updated 2021]
- CCPA vs CalOPPA: Which one applies to you and how to ensure data security compliance
- IT auditing and controls – planning the IT audit [updated 2021]
- Finding security defects early in the SDLC with STRIDE threat modeling [updated 2021]
- Cyber threat analysis [updated 2021]
- Rapid threat model prototyping: Introduction and overview
- Commercial off-the-shelf IoT system solutions: A risk assessment
- A school district's guide for Education Law §2-d compliance
- IT auditing and controls: A look at application controls [updated 2021]
- 6 key elements of a threat model
- Top threat modeling frameworks: STRIDE, OWASP Top 10, MITRE ATT&CK framework and more
- Average IT manager salary in 2021
- Security vs. usability: Pros and cons of risk-based authentication
- Threat modeling: Technical walkthrough and tutorial
- Comparing endpoint security: EPP vs. EDR vs. XDR
- Role and purpose of threat modeling in software development
- 5 changes the CPRA makes to the CCPA that you need to know
- 6 benefits of cyber threat modeling
- What is threat modeling?
- First Safe Harbor, then Privacy Shield: What EU-US data-sharing agreement is next?
- How to make cybersecurity budget cuts without sacrificing security
- How to mitigate security risk in international business environments
- Security theatrics or strategy? Optimizing security budget efficiency and effectiveness
- NY SHIELD Act: Security awareness and training requirements for New York businesses