X

Cloud Security: Is Your Public Cloud Storage Raining Sensitive Data?

As organizations of all sizes flock to public cloud environments like Amazon S3 and Microsoft…

Terry Crowley

5 Top Information Security Accreditations for SaaS Providers

The SaaS model depends on trust. As a SaaS provider, are potential customers confident they…

Jeremy Sporn

New Technologies Bring New Security Risks

It seems to be an artifact of how technology is designed and developed that “new…

Michael Walsh

The American Bar Association’s New Vendor Cybersecurity Checklist: A Must-Read for Legal Entities  

The Importance of Cybersecurity for Legal Entities The American Bar Association (ABA) clearly appreciates cybersecurity as a major…

Jeremy Sporn

Make a List, Check It Twice: 7 Steps to Ensure Your 2018 Security Posture is “Nice”

As 2017 draws to a close, you’re probably already planning for 2018. But don’t ring in the…

Terry Crowley

Compliance vs. Security – Are You Secure AND Compliant, or Just Compliant?

We see plenty of organizations that are compliant—but not secure. Yet rarely, if ever, do we find an…

Chris Banta

Why SaaS Companies Need to Implement ISO 27001

Software-as-a-Service (SaaS) deployments continue to gain popularity—but security remains the top barrier to adoption. How…

Jeremy Sporn

How to Avoid Common Pitfalls in CISO as a Service Engagements

Recently I had the interesting experience… chatting with a handful of potential Virtual Chief Information Security Officer (vCISO) clients…

John Verry

HITRUST CSF Certification for Hospitals – How Close is Compliance?

The Health Information Trust Alliance (HITRUST) Common Security Framework (CSF) is steadily gaining traction in…

Jeremy Sporn

Why “Preservation of Life” Should be the Fourth Pillar of the CIA Triad 

Many InfoSec professionals are familiar with the CIA triad, a longstanding model for information security policy within an…

Chris Banta