Enjoy discussions surrounding the compliance and operational needs that must be addressed in every organization.
Category: Compliance & Operational Security

A Simple Guide to Vulnerability Management
A "vulnerability assessment" discovers what vulnerabilities are present on your organization's infrastructure and classifies them according to their level of criticality. Vulnerability assessments are usually conducted by qualified personnel or Approved Scanning Vendors (ASVs) by means of a vulnerability scanner, such as Nessus, OpenVAS, QualysGuard, Nexpose, and so on. These are special forms of software ...

Incident Response: The Computer Security Incident Handling Guide
Organizations have to implement some form of assistance in order to mitigate the risks of computer security incidents. Computer security incidents encompass anything that violates a computer security policy or practice. Some good examples of computer security incidents include malware infection, DDoS attacks against a Web server, or data breaches, all of which necessitate immediate ...

What is Penetration Testing?
Penetration testers are hired ethical hackers tasked with simulating a real-world attack on an organization's networks and systems. Think of it as an intrusive security assessment that measures the organization's level of resistance to an attack. The great thing about penetration tests are that they test the organization's capabilities to defend against real-world attacks and ...

What Information Does Facebook Keep About You? See For Yourself! You’ll be Surprised
Are You Concerned About The Latest Facebook Trouble?If you're following the news, you'll know that Facebook is in deep water. What exactly happened? Back in 2014, Cambridge Analytica (CA), a British political consulting firm, which combines data mining, data brokerage, and data analysis with strategic communication for the electoral process, signed a data-sharing deal between SCL ...

10 Security Frameworks Every Cybersecurity Analyst Should Know
There are a number of frameworks that you'll need to know in order to familiarize your organization or agency with a range of leading guidelines and best practices to accomplish a necessary protection level from cyber incidents. Here are 10 security frameworks every cybersecurity analyst should know. 1. NIST Special Publication 800-53The "NIST," or the ...