Management, compliance & auditing October 21, 2015 Joey Cusimano Tips for Being a Pragmatic CSO The cybersecurity landscape is ever-changing, with new threats and technologies appearing every single day. There are more data breaches than ever, more compliance...
Management, compliance & auditing September 28, 2015 Ashiq JA Challenges Faced By CISOs: Balancing Security versus Manpower Cybersecurity is not about buying the latest security monitoring and automation tools to solve the day-to-day problems. Government and banking organizations...
Management, compliance & auditing August 31, 2015 Security Ninja How the SIEM Solution Can Help in Achieving PCI-DSS [download]Download the BEST PRACTICES FOR DEVELOPING AN ENGAGING SECURITY AWARENESS PROGRAM whitepaper[/download] Learn the best practices for developing a...
Management, compliance & auditing August 28, 2015 Jatin Jain Log Analysis using Splunk Light 45 Page eBook Splunk tools offer a great deal -- software that performs real-time, historical search, log analysis, graphical representation, dashboards, PCIDSS...
Management, compliance & auditing August 19, 2015 Security Ninja Where do PCI-DSS and PII intersect? [download]Download the BEST PRACTICES FOR DEVELOPING AN ENGAGING SECURITY AWARENESS PROGRAM whitepaper[/download] Learn the best practices for developing a...
Management, compliance & auditing June 19, 2015 Steve Lynch Transition of ISO 27001: 2005 to ISO 27001: 2013 ISO 27001 is an international standard published by the International Standard Organization (ISO). This standard acts as a specification for an information...
Management, compliance & auditing March 26, 2015 Jayanthi PCI-DSS and PA-DSS Today's online domain and a cashless way of transacting business have brought more players into the payment industry than yesterday. Cash is no longer considered...
Management, compliance & auditing March 16, 2015 Security Ninja Cyber Security Risks in Supply Chain Management – Part 2 In Part 1 of this article series, I discussed various risks involved in supply chain management with the latest example of a malicious adware named "Superfish"...
Management, compliance & auditing March 12, 2015 Security Ninja Cyber Security Risk in Supply Chain Management: Part 1 Cyber security is generally thought of as various types of security devices like firewalls, Web Application Firewall (WAF), IDS/IPS, SIEM, DLP etc. to safeguard...
Management, compliance & auditing March 10, 2015 Peter Lindley Remote Access Policy for IT Security Managers Imagine this scenario: You are the IT Security Manager for a large financial services organization. You've always had the assurance from knowing that your system...