More and more industry standards and regulations promote or even mandate that organizations apply the concept of “continuous compliance”. Continuous compliance includes the reconciliation...
Hi, what are you looking for?
More and more industry standards and regulations promote or even mandate that organizations apply the concept of “continuous compliance”. Continuous compliance includes the reconciliation...
As news of more data breaches and third-party originated cyber-attacks continue to make the news, businesses and regulators alike are sharpening their focus on...
Managing IT risk is an essential component of the business risk management process, which has achieved broader adoption in recent years. However, with the...
Despite increased investments in preventive security measures, many organizations are losing the war against cyber criminals.The data breaches at Target, Home Depot, Staples, Michaels,...
In February 2014 the National Institute of Standards and Technology (NIST) issued a new set of cyber security guidelines designed to help critical infrastructure...
The increasing severity and volume of cyber-attacks has motivated many organizations to improve and pay particular attention to security risk management.
Data breaches at companies such as Target, Home Depot, Staples, Michaels, eBay, and Sony Pictures Entertainment are raising doubts about whether organizations are investing...
With cyber criminals increasingly targeting third-party vendors to gain backdoor access to data at large, well-protected global organizations, security professionals need to rethink their...
According to Gartner, worldwide spending on information security was expected to reach $71.1 billion in 2014, an increase of 7.9 percent over 2013. Total...
Remember the days when security awareness programs only had to warn employees about website spoofing? Unfortunately, cyber-attack methods have advanced to the point where...