In the digital age, user and company data is a prime target for malicious actors. Personal information like account credentials and credit card numbers can be exploited for theft and…
-
-
RSI Security recently hosted our third Executive Development Series webinar, Cybersecurity Management, on September 18, 2024. Our founder and managing director, John Shin, began with brief introductions to get audience…
-
The Payment Card Industry Data Security Standard (PCI DSS) is a globally recognized framework that outlines essential PCI DSS compliance requirements for protecting sensitive payment data. These requirements apply to…
-
A virtual Chief Information Security Officer (vCISO) offfers flexible, on-demand cybersecurity expertise as an external consultant, as opposed to a full-time CISO. By leveraging AI and machine learning, vCISOs automate…
-
HITRUST maturity levels guide organizations through their cybersecurity and compliance journey. These levels range from the foundational ‘Policy’ level, where basic security controls are first established, to the ‘Managed’ level,…
-
Many organizations that previously needed to comply with the PCI PA-DSS now need to comply with the PCI SSF. This compliance involves meeting twelve security control objectives, along with requirements…
-
ISO 42001 certification is a new international standard for managing the security, privacy, and fairness of AI tools and systems. Although it is not yet required by regulators, many organizations…
-
RSI Security recently hosted our second Executive Development Series webinar, Cybersecurity Leadership, on August 23, 2024. Our founder and managing director, John Shin, began with a swift recap of topics…
-
In the past two years, two global standards have significantly impacted the security landscape: the first edition of ISO 42001 (2023) and the third edition of ISO 27001 (2022). While…
-
Understanding the HITRUST Alliance: Key Facts and Its Role in Cybersecurity
by RSI Securityby RSI SecurityCybercriminals pose a significant threat to sensitive data, which can be especially vulnerable when stored by third parties, such as in healthcare settings. Protecting such data requires robust cybersecurity measures…