Management, compliance & auditing August 10, 2021 Beth Osborne How to comply with FCPA regulation – 5 Tips Check out the top five methods you can use in order to come into compliance with the Foreign Corrupt Practices Act of 1977 (FCPA).
(ISC)² CISSP March 23, 2021 Beth Osborne CISSP concentrations (ISSAP, ISSMP & ISSEP) [updated 2021] Want to stand out from the 147,000+ CISSP holders? Earn a CISSP specialization of ISSAP, ISSEP or ISSMP.
Malware analysis February 4, 2021 Beth Osborne CISA report: Iranian web shells (and other MARs) The Cybersecurity & Infrastructure Security Agency (CISA) published a Malware Analysis Report (AR20-259A) regarding MAR-10297887-1.v1 – Iranian Web...
Critical infrastructure February 2, 2021 Beth Osborne Incident response and recovery best practices for industrial control systems In collaboration with the North American Electric Reliability Corporation (NERC), the Federal Energy Regulatory Commission (FERC) developed a 2020 Cyber Planning...
Threat Intelligence January 14, 2021 Beth Osborne FBI releases Rana Intelligence Computing indicators of compromise (IOCs) The FBI’s Cyber Division recently disclosed that Iran’s intelligence agency is employing nation-state actors and a front company, Rana Intelligence Computing,...
Vulnerabilities January 4, 2021 Beth Osborne Software vulnerability patching best practices: Patch everything, even if vendors downplay risks Software vulnerability continues to be a challenging cybersecurity risk. Cybercriminals are able to seize on these vulnerabilities and breach systems. The time...
Management, compliance & auditing November 4, 2020 Beth Osborne Business closures and consolidations: An information security checklist In the current climate — a pandemic, economic uncertainty and an election year in the United States — businesses are feeling the strain. It’s forcing...
Professional development November 3, 2020 Beth Osborne Key findings from “The Life and Times of Cybersecurity Professionals 2020” Enterprise Strategy Group (ESG) and the Information Systems Security Association (ISSA) recently published its fourth annual report on the experiences of...
NICE Framework September 14, 2020 Beth Osborne 7 NICE Cybersecurity Workforce Framework categories: Everything you need to know In the world of cybersecurity, there are many roles to play. While those roles can vary, there is also the NICE (National Initiative for Cybersecurity Education)...
Phishing September 8, 2020 Beth Osborne 4 types of phishing domains you should blacklist right now Phishing isn't going away. In fact, it's seen substantial gains by playing off coronavirus fears. While enterprises spend a considerable amount of effort and...