Article

Information Security vs. Cybersecurity: Main Differences

Cybersecurity and information security are often assumed to be synonymous terms. They're not. On the contrary, they have several critical differences that security professionals should under ...
April 4, 2022
Article

Risk Mitigation in Software Engineering

Developing software while preserving its embedded security can feel like an impossible task. As you update your product, you’re potentially adding new vulnerabilities. So as part of the ri ...
August 12, 2021
Article

How to Protect Your Data From Ransomware

If the word "ransom" makes you think of old crime movies, where the darling child of the sheriff is held captured until a certain sum of money has been paid, then you have a good idea what r ...
May 26, 2021
Article

ISO 27001 Firewall Security Audit Checklist

Because of additional regulations and standards pertaining to information security, including Payment Card Industry Data Security Standard (PCI-DSS), the General Data Protection Regulation ( ...
August 27, 2020
Article

Network Security Audit Checklist

Every company that uses computers and the Internet should be concerned about information security and particularly, network security. The number of threats each company faces is growing e ...
August 4, 2020
Article

How the COSO Framework Helps You Comply with SOX

In May 2013, the Committee of Sponsoring Organizations of the Treadway Commission (COSO) released its updated Internal Control-Integrated Framework. COSO is an organization that aims to impr ...
June 4, 2020
Article

Cybersecurity Audit Checklist

...
December 19, 2019
Article

How to Map PCI DSS to the NIST Cybersecurity Framework

Organizations face an increasing number of compliance metrics. Risk management is of paramount importance and is feeding the need for governance. Terms like PCI DSS and NIST CSF are two fram ...
December 3, 2019
1 2