Article
Third Party Security Risk: Don’t Let Friends Become Gate Crashers
Organizational growth brings the need for more vendors to enhance areas of your business lines; however, these vendors cause third party security risk. To shore up your risk profile, you nee ...
July 25, 2017
Article
How to Scope PCI Compliance in a Few Easy Steps
One of the most difficult parts of PCI compliance lies in the sheer size of the compliance requirement. Twelve objectives with various sub-steps expand into 139 pages of standard. Because it ...
July 20, 2017
Article
Cybersecurity Management and GRC Automation
As wave after wave of cyberattacks threatens international security, cybersecurity management becomes more pressing. Although it has always been on business’s radar, the recent barrage bri ...
July 18, 2017
Article
Compensating Controls: What You Need to Know
Compensating Controls: What You Need to Know
PCI DSS compliance comes with over 100 pages of requirements. However, the Appendices offer ways to think about how you can limit your ...
July 13, 2017
Article
Wednesday’s Women in Infosec: Kristina Birk
This month's profiled woman in information security is Kristina Birk. Ms. Birk has been working with technology since 19*cough-cough*, spending the bulk of her career in IT operations and a ...
July 12, 2017