Beth Osborne

Beth Osborne

The ultimate guide to DoD 8570 certification and compliance

Everying you need to know about the Department of Defense's 8570 Directive.

How to comply with FCPA regulation – 5 Tips

Check out the top five methods you can use in order to come into compliance with the Foreign Corrupt Practices Act of 1977 (FCPA).

CISSP concentrations (ISSAP, ISSMP & ISSEP) [updated 2021]

Want to stand out from the 147,000+ CISSP holders? Earn a CISSP specialization of ISSAP, ISSEP or ISSMP.

Incident response and recovery best practices for industrial control systems

Introduction  In collaboration with the North American Electric Reliability Corporation (NERC), the Federal Energy Regulatory Commission (FERC) developed a

Software vulnerability patching best practices: Patch everything, even if vendors downplay risks

Software vulnerability continues to be a challenging cybersecurity risk. Cybercriminals are able to seize on these vulnerabilities and breach systems. The ti

7 NICE Cybersecurity Workforce Framework categories: Everything you need to know

Introduction In the world of cybersecurity, there are many roles to play. While those roles can vary, there is also the NICE (National Initiative for Cyberse

4 types of phishing domains you should blacklist right now

Phishing isn't going away. In fact, it's seen substantial gains by playing off coronavirus fears. While enterprises spend a considerable amount of effort and

Recruitment agent in blue business suit activating IT AUDITOR on an interactive virtual control screen. Information technology job concept relating to planning of audits in the oil and gas industry.

What does an IT auditor do?

In the world of cybersecurity, the position of IT auditor has become very significant and is a growing occupation, with thousands of job openings now availab

Earning CISA CPE credits

The Certified Information Systems Auditor (CISA) credential, offered through ISACA, requires certified practitioners to attain continuing professional educat

Male corporate executive touching CISO on an interactive virtual control monitor. Business management occupation metaphor and information technology concept for Chief Information Security Officer.

Management guide for CISOs: Responsibilities, strategies and best practices

Chief Information Security Officer (CISO) is a role that is becoming prevalent in a variety of companies that have sophisticated cybersecurity protocols. A C

Cyber security concept: Shield With Keyhole icon on digital data background. Illustrates cyber data security or information privacy idea. Blue abstract hi speed internet technology.

DoD RMF Revision 2: New updates and their impact on cybersecurity

In December of 2018, the National Institute of Standards and Technology (NIST) published an update for the Department of Defense (DoD) Risk Management Framew

Binary data under a magnifying lens. Digital illustration.

Secure coding — Top 15 code analysis tools

Keeping code secure is a top objective for any software company. And to ensure secure coding, you need to perform code analysis during the development life c