Understanding and managing risk Security teams often use a variety of vulnerability management and...
Author - Allison Cramer
Confessions of a “Hacker” and How to Protect Your Enterprise
In the Art of War, legendary strategist Sun Tzu speaks of the necessity of understanding your enemy...
6 Reasons Why Cyber Crime Is Increasing – And What You Can Do...
If you’re like most people, you probably lock the doors of your home or apartment when you’re not...
IT Security & Compliance Introduction
New to IT Security & Compliance? Start here! The “digitization of everything” trend is forever...
Introduction to SOX Compliance
What Is Sarbanes-Oxley (SOX) compliance? The Public Company Accounting Reform and Investor...
SOA Compliance
What is SOA? SOA stands for service-oriented architecture, and it is an architecture that allows...
Introduction to HIPAA Compliance
What is HIPAA Compliance? The American Health Insurance Portability and Accountability Act of 1996...
Introduction to SEC Compliance
What is SEC compliance? SEC compliance is adherence to the rules and regulations that the...
Introduction to PCI Compliance
What is PCI DSS? Payment Card Industry Data Security Standards, or PCI DSS, are a group of security...
Introduction to DISA Compliance
What is DISA compliance? The Defense Information Systems Agency is a part of the Department of...