Comparing Mobile & Web Application Penetration Testing

Comparing Mobile & Web Application Penetration Testing

Pentesting mobile applications is quite different from pentesting web applications. Comparing the two processes lets us make better choices for our security systems and saves time and money.... Go on to the site to read the full article ... Read More
The Best & Worst Practices of Incident Response

The Best & Worst Practices of Incident Response

Incident response is often an impromptu security area — organizations don’t think about it until an incident occurs. Your response to an incident will be the deciding factor as to whether or... Go on to the site to read the full article ... Read More
Breach Notification Requirements for Healthcare Providers

Breach Notification Requirements for Healthcare Providers

The healthcare industry has so many data security regulations that it can become overwhelming. These regulations are developed and implemented at the local, state and federal level, as well as... Go on to the site to read the full article ... Read More
9 Tips for Improving Your Incident Response Strategy

9 Tips for Improving Your Incident Response Strategy

Incident response is a complex process involving many moving parts. Follow these suggestions to improve incident response across your organization. 1. Hire the Right Staff You can have the best... Go on to the site to read the full article ... Read More
CRISC Certification: Overview & Career Path

CRISC Certification: Overview & Career Path

Introduction ISACA’s Certified in Risk and Information Systems Control™ certification is an enterprise risk management qualification, favoured by professionals looking to build upon their existing... Go on to the site to read the full article ... Read More
Top 10 Ways Your Healthcare Organization May be Violating HIPAA and Not Know It

Top 10 Ways Your Healthcare Organization May be Violating HIPAA and Not Know It

/ / Security Awareness
HIPAA legislation was established by the US Federal Government in 1996. These are rules and standards designed to protect the security and privacy of patient health information. It has implemented... Go on to the site to read the full article ... Read More
Introduction – An Overview of Word Press

Introduction – An Overview of Word Press

/ / Application Security
This platform was founded back in May 27, 2003, and the entity primarily responsible for its research/development and continued growth is that of the Word Press Foundation. It is important to note... Go on to the site to read the full article ... Read More