Blog

  • Recap: RSI Virtual Summit (Webinar featuring Jscrambler)

    Recap: RSI Virtual Summit (Webinar featuring Jscrambler)

    RSI Security recently partnered with Jscrambler in an interactive Virtual Summit webinar. RSI Security’s Founder and Managing Director, John Shin, opened the event with a meditation on the importance of context and executing a power-move to go from context dependence to context awareness and agility—from needing context to recognizing it and operationalizing it. (more…)

  • How to Leverage MSSP Services for Cybersecurity and Compliance

    How to Leverage MSSP Services for Cybersecurity and Compliance

    Getting the most out of MSSP services means taking advantage of five unique benefits:

    • Top-line governance and advisory, including outsourced C-suite services
    • Assistance planning and building out robust cybersecurity infrastructure
    • Guided implementation across multiple regulatory frameworks’ controls
    • Comprehensive risk assessment and threat and vulnerability management
    • Streamlined assessments and certifications for regulatory compliance

    (more…)

  • How to Set Up a Secure Network: Back to Basics

    How to Set Up a Secure Network: Back to Basics

    Unauthorized access to your private data, eavesdropping and stealing are far too common due to your wireless connection not being secure enough. Setting up a secure network can be easy if you follow along.

    (more…)

  • Avoiding a Credit Card Data Breach

    Avoiding a Credit Card Data Breach

    The financial and reputational impact of a credit card data breach can be devastating. In 2017, the average cost of a breach reached $3.62 million, with over five million records stolen every day. To protect your business from becoming part of these costly statistics, it’s essential to understand where the risks lie.

    In this article, we’ll explore how credit card data breaches occur and outline practical steps your company can take to strengthen defenses and prevent them. (more…)

  • Should You Be Conducting Cloud Penetration Testing?

    Should You Be Conducting Cloud Penetration Testing?

    Penetration testing is an advanced cybersecurity method that is especially useful in complex environments, such as those that make heavy use of cloud computing. In these cases, cloud pen testing is often required. But even when it’s not mandated, regular penetration testing is considered a best practice for cyber hygiene. (more…)

  • What are the 10 Fundamentals of NERC CIP Compliance?

    What are the 10 Fundamentals of NERC CIP Compliance?

    A cyberattack on key utility infrastructure of a nation can spell disaster, especially as a part of a firesale attack (a cyber attack that intends to disable or render unusable the nation’s transportation, utilities, telecommunications, and financial infrastructure).

    The potential doomsday scenario has many nations considering the impact the fall out of a wide scale cyberattack could have on the country’s stability and economy. 

    (more…)

  • HITRUST Certification Requirements: Everything You Need to Know

    HITRUST Certification Requirements: Everything You Need to Know

    Information systems offer many benefits for companies in terms of efficiency and organization. Yet, some companies see the institution of new technology as a hassle, making electronic information protection just another roadblock. However, with the emergence of the Health Information Trust Alliance (HITRUST), information protection has become more manageable, particularly with the creation of the Common Security Framework (CSF). 

    There are various factors that businesses should be aware of to best meet HITRUST CSF requirements. Read on to find out what the requirements are to become HITRUST certified. 

    (more…)

  • What is the Penetration Testing Execution Standard?

    What is the Penetration Testing Execution Standard?

    By following the Penetration Testing Execution Standard (PTES), companies of all sizes are capable of executing an effective pen test that exposes any issues in their cybersecurity. By conducting penetration (pen) testing, you can determine how a hacker would attack your systems by watching an assault unfold in a controlled environment. And the only way to ensure that this kind of test will work is to make sure it meets certain standards.

    (more…)

  • What is NIST and NIST Cybersecurity Framework?

    What is NIST and NIST Cybersecurity Framework?

    When it comes to technology and science, the U.S. Government has a variety of bodies and agencies that help support innovation and promote industry-wide standards. One of the most important (and under appreciated) of these organizations is NIST. (more…)

  • NIST 800-171 Checklist: What You Need to Know

    NIST 800-171 Checklist: What You Need to Know

    When it comes to data that cyber criminals are after, defense and military information rank near (if not at) the top of the list. And its not something the U.S. Department of Defense (DOD) federal government is taking lightly. Between cyber protection, support, and other teams, the DOD is on pace to have 133 teams of federal agencies dedicated specifically to cyber defense. In addition, the DOD is working with the National Institute of Standards and Technology (NIST) to implement regulations that will also make sensitive data handled by DOD and government contractors secure as well.

    (more…)