Smartphones, smartwatches, smart fridge, smart tv, but what about smart security? Organizations realize that IoT (internet of things) security is rapidly becoming the new frontier for their security ecosystem.
-
-
An incident response tabletop scenario is an exercise where security teams discuss, in a classroom-type setting, their roles in response to an emergency. This discussion is usually conducted by a…
-
Constructing a Cyber Risk Assessment Questionnaire for Your Business
by RSI Securityby RSI SecurityConstructing and effectively using a cyber risk assessment questionnaire is one of the cornerstones of a security leader’s job to successfully evaluate risk. A risk assessment is a thorough look…
-
The Vulnerability Management Lifecycle is a cybersecurity practice that helps fortify an organization’s readiness to anticipate and handle attacks.
-
Law firms are attractive targets for cyber criminals. While the information they harbor isn’t as closely protected as that of the healthcare industry, it can be just as sensitive, if…
-
The introduction of new technologies has many industries peddling on the backfoot when it comes to cybersecurity. The CIS critical security controls framework addresses the issues that industries face when…
-
A 2014 article on the Forbes website says that the future is mobile. Today, 6 years after the release of that Forbes article, it’s clearer than ever before that the…
-
With record-breaking GDPR fines and penalties reaching 50 million euros, it might be time to revise your GDPR compliance strategy.
-
When companies work with federal agencies, their cyberdefense becomes a matter of national security. This is especially true for companies that process federal contract information (FCI), protected by Federal Acquisition…
-
Data breaches are costing your industry an average of $3.16 Million every year. Here is how you can save yourself the hassle of dealing with the fallout.