HHS Cybersecurity Performance Goals: Context and 2 Comprehensive Checklists
Few pieces of data are as intimate and private as health records. Because of the sensitive nature of the data,…
Few pieces of data are as intimate and private as health records. Because of the sensitive nature of the data,…
On August 8, 2023, NIST published the initial public draft for version 2.0 of its Cybersecurity Framework (NIST CSF 2.0).…
Due to a lack of a common language in the security world, it’s easy to get confused and overwhelmed. Considering…
What is the FTC Safeguards Rule? Initially established in 2003, the FTC Safeguards Rule outlines data security guidelines for organizations…
When your organization reaches a risk assessment score threshold it finds acceptable, that’s not the time to take your foot…
If you’re a contractor for the DOD, the CMMC needs to be on your radar. Security requirements will be built…
You can’t prevent all security incidents from happening, but businesses that avoid many of them tend to have commonalities. Here…
Manufacturing businesses are uniquely vulnerable to attackers. Their business models are hyper-affected by potential breaches. Take a look at how…
In the brokenness of the information security industry, our inability to communicate effectively stands out above the rest as one…
Information security incidents are unavoidable. It’s important to learn how to respond effectively to and manage an incident that does…
Logically, we approach investigations holistically from four different perspectives; the company itself, what was in place for prevention, what was…
Information security is a living, breathing process that’s ongoing, it’s a life cycle. Without a life-cycle approach to information security…