Avoiding A Cyber Tort Lawsuit
Creating a Secure Computer User
The Ten Steps to Thwarting the Insider Threat
By: Nitin Kumar CMC, CCISO, CISSP, PMP, CGEIT Wargames can help forecast future scenarios holistically and help build a proactive strategy and a better reactive strategy.
By: Sameer Shelke, CISSP, CISA, BS7799 LA, ITIL Highly sophisticated and targeted security attacks have become the norm, and ‘Phishing’ is one of the most commonly employed techniques to spread malware.
By: Todd Bell CCISO, CISSP, PMP, QSA, MPM, MBA It is no secret that the PCI Standard itself has opportunities for enhancement and is in need of clarification for certain areas, but even a perfected PCI Standard cannot compensate for exception processes that permit security weaknesses, the failure to properly identify PCI Scope, improperly identify […]
By: Todd Bell CCISO, CISSP, PMP, QSA, MPM, MBA This top 10 list is designed to help CISOs avoid the daily traps that distract their teams from carrying out tactical and strategic functions.
By: Todd Bell CCISO, CISSP, PMP, QSA, MPM, MBA During the height of the Colorado Springs fires, in which 346 homes were lost, another fierce fire was burning at a well-known company that was “faking” its PCI compliance status to its acquiring banks and the millions of customers they serve.
Target, Neiman Marcus and Michaels Are Not the Only Companies to Blame for the Recent Security Breaches. Some of the low cost QSA Companies are behind some of the biggest security breaches in the USA.