Response Operations: BCP, IRP, and DRP - Why You Need all Three
by Andrew Paull on February 21, 2019 at 1:00 PM
No well-managed organization is immune to the risk of the potential business interruptions that may occur from time to time, whether caused by acts of nature, malicious attack, or simple human error. Depending on the severity of the interruption and the organizational assets and busin …
The Cyber Rabbit Hole: Computer Forensics
by Danielle Corsa on February 17, 2019 at 1:00 PM
This blog is for anyone daring and brave enough to follow the rabbit hole into the realm of computer forensics where there lies the truth. The main objective for an analyst is to be able to dig up the digital past with no judgement of the outcome. There must be a legitimate need to co …
Secure Programming: An Afterthought.
by George Seerden on February 13, 2019 at 1:00 PM
I’ve been a professional programmer for nearly 16 years. I didn’t learn to program in college, the military taught me. It wasn’t until my seventh year that the security of the applications I was working on was taken seriously. That is seven years of code that was more than likely vuln …
New PCI Software Security Framework Published
by Patrick Hughes on February 9, 2019 at 1:00 PM
The PCI Security Standards Council published its new Software Security framework on Wednesday January 16th, 2019. The council has stated that the existing standards will be officially retired in 2022.
Updates to MA 201 CMR 17 Data Breach Law
by Derek Boczenowski on February 1, 2019 at 1:00 PM
The Laws, they are a’ changin’… …to paraphrase Bob Dylan. And I’m speaking about privacy and breach laws. It would seem that every other day we hear of another set of customer data being compromised at another company. It could be just name and address, but it could be phone number, S …