Article

Third Party Security Risk: Don’t Let Friends Become Gate Crashers

Organizational growth brings the need for more vendors to enhance areas of your business lines; however, these vendors cause third party security risk. To shore up your risk profile, you nee ...
July 25, 2017
Article

How to Scope PCI Compliance in a Few Easy Steps

One of the most difficult parts of PCI compliance lies in the sheer size of the compliance requirement. Twelve objectives with various sub-steps expand into 139 pages of standard. Because it ...
July 20, 2017
Article

Cybersecurity Management and GRC Automation

As wave after wave of cyberattacks threatens international security, cybersecurity management becomes more pressing. Although it has always been on business’s radar, the recent barrage bri ...
July 18, 2017
Article

Compensating Controls: What You Need to Know

Compensating Controls: What You Need to Know   PCI DSS compliance comes with over 100 pages of requirements. However, the Appendices offer ways to think about how you can limit your ...
July 13, 2017
Article

Wednesday’s Women in Infosec: Kristina Birk

This month's profiled woman in information security is Kristina Birk. Ms. Birk has been working with technology since 19*cough-cough*, spending the bulk of her career in IT operations and a ...
July 12, 2017