
DoD 8570
The ultimate guide to DoD 8570 certification and compliance
Everying you need to know about the Department of Defense's 8570 Directive.

Management, compliance & auditing
How to comply with FCPA regulation – 5 Tips
Check out the top five methods you can use in order to come into compliance with the Foreign Corrupt Practices Act of 1977 (FCPA).

(ISC)² CISSP
CISSP concentrations (ISSAP, ISSMP & ISSEP) [updated 2021]
Want to stand out from the 147,000+ CISSP holders? Earn a CISSP specialization of ISSAP, ISSEP or ISSMP.

Critical infrastructure
Incident response and recovery best practices for industrial control systems
Introduction In collaboration with the North American Electric Reliability Corporation (NERC), the Federal Energy Regulatory Commission (FERC) developed a

Vulnerabilities
Software vulnerability patching best practices: Patch everything, even if vendors downplay risks
Software vulnerability continues to be a challenging cybersecurity risk. Cybercriminals are able to seize on these vulnerabilities and breach systems. The ti

NICE Framework
7 NICE Cybersecurity Workforce Framework categories: Everything you need to know
Introduction In the world of cybersecurity, there are many roles to play. While those roles can vary, there is also the NICE (National Initiative for Cyberse

Phishing
4 types of phishing domains you should blacklist right now
Phishing isn't going away. In fact, it's seen substantial gains by playing off coronavirus fears. While enterprises spend a considerable amount of effort and

Management, compliance & auditing
Management guide for CISOs: Responsibilities, strategies and best practices
Chief Information Security Officer (CISO) is a role that is becoming prevalent in a variety of companies that have sophisticated cybersecurity protocols. A C

DoD 8570
DoD RMF Revision 2: New updates and their impact on cybersecurity
In December of 2018, the National Institute of Standards and Technology (NIST) published an update for the Department of Defense (DoD) Risk Management Framew

Secure coding
Secure coding — Top 15 code analysis tools
Keeping code secure is a top objective for any software company. And to ensure secure coding, you need to perform code analysis during the development life c