The California Consumer Privacy Act (CCPA) protects the rights of data subjects in California. The CCPA statute of limitations refers to two things, broadly: the timeframe within which legal action…
-
-
The increasingly mobile and cloud-based world offers immense benefits to organizations, but this interconnectedness also exposes them to risk. Online attack surfaces have increased exponentially with highly motivated threat actors…
-
Across industries, the rapidly evolving IT landscape presents opportunities for threat actor activity. Attack sophistication and innovation call for robust cybersecurity defenses; rapid detection and analysis are critical to identifying…
-
Payment Card Industry (PCI) compliance is required for security and stability of all card-related transactions, regardless of industry. The Data Security Standard (DSS) as stipulated by the PCI is broken…
-
The American Institute of Certified Public Accountants (AICPA) publishes various audit and reporting guides designed to keep companies and their stakeholders safe. One that applies to most service organizations, including…
-
Regardless of how robust an organization’s cybersecurity defenses are, cyber threat actors employing social engineering attacks remain a substantial threat. Unlike technologically-focused attacks that exploit vulnerabilities in an organization’s networks…
-
Improving an organization’s brand starts with the reliability and availability of its services. Whether individuals or other organizations, customers want to ensure that services are delivered and processes executed consistently.…
-
Any organization that handles cardholder data (CHD) is required to follow the Data Security Standards (DSS) established by the Payment Card Industry (PCI). These rules and regulations play a critical…
-
Email is the primary internal and external communication method for most organizations. Unfortunately, it also presents a significant security risk. As such, the various email vulnerabilities must be accounted for…
-
How and Why DoD Contractors Must Protect Covered Defense Information
by RSI Securityby RSI SecurityThe federal government utilizes contractors to provide routine services and products to achieve the nation’s missions and conduct operations. During the course of business, the government shares sensitive information with…