Skip to main content

Blog

Vendor Risk Management - How to Start and Where to Go

Tuesday, September 26, 2017

Vendor risk management is a recommended activity that has been stressed for almost ten years in the financial industry. The FDIC released a financial institution letter in 2008 to help teach banks how to properly manage the additional risk of outsourcing part of their processing to external vendors....

Read More...

Categories: Blog

{Whitepaper} Patch Management: The Basics

Tuesday, August 22, 2017

If you have a system with software, you NEED to be patching religiously. Not staying up-to-date on patches will leave you vulnerable to known attacks. It is the equivalent of leaving your doors unlocked in an unsafe neighborhood, and the internet is most certainly not a safe neighborhood.

Read More...

Categories: Blog, Whitepapers

{Whitepaper} Framework for Planning to Fail Well

Thursday, July 20, 2017

Incident response has always been a critical component of an effective Information Security Program, but operating without an effective Incident Response Plan in today’s world is like jumping into the deep end without knowing how to swim.  New types of security-related incidents are emerging and at ...

Read More...

Categories: Blog, Whitepapers

Petya: PLEASE Patch Your Computers!

Thursday, June 29, 2017

The internet has experienced yet another “global” ransomware epidemic, this time in the form of a new variant named “Petya.” Petya was initially discovered in the wild back in March of 2016, but this new variant sports some serious upgrades. Petya is now “wormable,” using the same SMBv1 exploit, als...

Read More...

Categories: Blog, In the News
Page 27 of 31First   Previous   22  23  24  25  26  [27]  28  29  30  31  Next   Last