FINRA 2019 Priorities Letter Released
by CJ Hurd on January 30, 2019 at 10:54 AM
In this blog we’ll be discussing the release of the Financial Industry Regulatory Authority’s (FINRA) 2019 Risk Monitoring and Examination Priorities Letter. The letter, released on January 22nd, 2019, highlights new priorities and identifies ongoing areas of concern for the coming ye …
Emotet Malware Warning From MS-ISAC
by Austin Wolfson on January 23, 2019 at 2:14 PM
In this blog we’ll be discussing the Emotet malware program, particularly regarding the most recent and ongoing malspam campaign using the Multi-State Information Sharing and Analysis Center (MS-ISAC), and State, Local, Tribal, and Territorial (SLTT) branding.
Introduction to Business Continuity Planning
by CJ Hurd on January 7, 2019 at 11:47 AM
This is part 1 of a 4-part series as we discuss Business Continuity Planning (BCP). We will take you through conducting a Business Impact Analysis, Plan Implementation, and BCP Testing in the coming months as part of this series.
PCI Requirement 12 - People, Policies, and Processes Time!
by Derek Morris on December 19, 2018 at 2:46 PM
This is the twelfth blog in a 12-part series addressing each PCI DSS Requirement and the challenges faced by companies going through this process. To view the previous posts in this series, click on the appropriate links below: PCI Requirement 1 - Defending the Wall PCI Requirement 2 …
PCI Requirement 11 - Testing, Testing, 1, 2, 3!
by Derek Morris on December 4, 2018 at 9:36 AM
This is the eleventh blog in a 12-part series addressing each PCI DSS Requirement and the challenges faced by companies going through this process. To view the previous posts in this series, click on the appropriate links below: PCI Requirement 1 - Defending the Wall PCI Requirement 2 …
PCI Requirement 10 - Big Brother is Watching!
by Derek Morris on October 30, 2018 at 10:44 AM
This is the tenth blog in a 12-part series addressing each PCI DSS Requirement and the challenges faced by companies going through this process. To view the previous posts in this series, click on the appropriate links below: PCI Requirement 1 - Defending the Wall PCI Requirement 2 - …