Years ago, governments defended themselves through espionage and military engagement. Today, there are still plenty of both. However, the form they’ve taken has changed drastically. Physical spies have given way…
-
-
If you are a client or a business that supports clients that serve the Department of Defense (DoD) as a contractor or subcontractor you’ve likely heard of Defense Federal Acquisition…
-
Sensitive data breaches and data loss are major concerns for any organization. The prospect of a financial data breach, however, often results in public panic and can lead to media…
-
Many different auditing processes exist, and companies increasingly face the challenge of choosing which type to conduct. Consumers and business partners demand data protection, so it is vital that companies…
-
In 2015 a man named Alastair Mactaggart had a conversation with a friend of his, a Google engineer, about the amount of data Google had on people. The more he…
-
It is a landmark regulation that is seen to have ripple effects on the cybersecurity practices of financial institutions not only in the United States but also worldwide. The New…
-
Today’s Mobile Environment: If it is true that time flies, then it must be true that technology rockets. Today, the race for faster, smarter and more sophisticated technology dominates headlines…
-
How to Choose the Best Third-party Risk Management Certification Provider
by RSI Securityby RSI SecurityIn today’s business world, effective and efficient risk management is considered a major factor in the overall success of organizations. Businesses are investing heavily in third-party risk management programs to…
-
Security risks come in all shapes and sizes and affect all manner of companies. For small businesses, like a local computer repair shop, security is important, but requires only a…
-
Information security policy is an extremely important topic of discussion that is often not discussed at all due to a number of reasons. Organizations often find that after they create…