Use these Critical Security Controls for a Better Security Posture

As we near the end of 2018, technology professionals and businesses alike are looking back on the last 12 months and evaluating highs and lows. For businesses, this can be an ...
Read More

The Key Components to an Information Security Policy

Information Security Policy (ISP) is a set of rules enacted by an organization to ensure that all users or networks of the IT structure within the organization’s domain abide ...
Read More

Consider These Factors When Calculating the Cost of a Data Breach

Data breaches are one of the most common types of security incidents. It is quite possible, although it may be hard to prove, that every company around the globe was at some ...
Read More

Ways to Reduce the Exorbitant Costs of a Data Breach

Reducing the cost of data breaches is a vital consideration for any good security strategy. In fact, when a breach occurs, many factors can influence its cost, either ...
Read More

Ten Ways Your Healthcare Org May Be Violating HIPAA

HIPAA legislation was established by the US Federal Government in 1996. These are rules and standards designed to protect the security and privacy of patient health ...
Read More

The Pros and Cons to Outsourcing Incident Response

Companies usually outsource tasks if they are more cost effective and can produce consistent results. Outsourcing incident response functions ensures a company will get ...
Read More

Stretching Your Security Budget

An excessive security budget isn’t the only way to build strong security
Read More

Training Ideas for Machine Learning in Security

If you’ve been evaluating new security tools, you’ve undoubtedly heard machine learning (ML) touted many times. It is fast becoming the backbone of all modern software, ...
Read More