Privacy impact assessment tools serve multiple purposes in IT security. One is compliance with industry and location-based regulations. The EU’s General Data Protection Regulation (GDPR) exists to identify and minimize…
-
-
Security program management presents the traditional Chief Information Security Officer (CISO) role with numerous challenges further complicated by the current proliferation of cyberthreats. As a C-level executive role, CISOs are…
-
What is a HITRUST Validated Assessment, and Does Your Organization Need One?
by RSI Securityby RSI SecurityThe HITRUST CSF can help organizations streamline compliance across multiple regulatory frameworks, address security gaps, and strengthen overall cybersecurity. Compliance with the HITRUST CSF may require your organization to complete…
-
What Exactly is a vCISO? How Outsourcing the CISO Role Can Optimize Cyberdefense ROI
by RSI Securityby RSI SecurityWith so many online threats, network vulnerabilities, and IT security gaps, the role of the chief information security officer (CISO) has never been more important. The role is in such…
-
SSL Security and PCI Compliance for eCommerce: Top Challenges and Considerations
by RSI Securityby RSI SecurityeCommerce businesses that process large volumes of card payment transactions must protect the sensitive data involved. Strong SSL security and PCI compliance for eCommerce practices can minimize data breach risks…
-
Social Engineering is the Art of What Three Things? Tactical Guide and Examples
by RSI Securityby RSI SecuritySocial engineering remains one of the most reached-for techniques in the average hacker’s toolbox. The cyberattack’s effectiveness (and many hackers viewing it as a fun and exciting game) has made…
-
One of the most impactful methods for securing networks uses offense to inform defenses. A network penetration test is a simulated attack on an organization’s network infrastructure, with the goal…
-
Why choose the HITRUST CSF over other control frameworks like NIST SP 800-53 and ISO/IEC 27001?
by RSI Securityby RSI SecurityOrganizations seeking streamlined solutions to their regulatory compliance requirements often look to comprehensive frameworks. The HITRUST CSF, the National Institute for Standards and Technology’s Special Publication 800-53 (NIST SP 800-53),…
-
Malware is an inescapable reality in today’s cybersphere. Hackers with increasingly sophisticated methods are always looking for exploitable vulnerabilities to breach organizational security. It’s a question of ‘when’ rather than…
-
Security teams are dealing with new digital threats on an almost daily basis. From malware and ransomware to highly sophisticated, AI-driven attacks, IT teams always have their hands full. But…