security audit
5 Security Holes Most Often Revealed via Cybersecurity Asset Management
Although it may not get the buzz like AI, machine learning, zero-day or deception technologies, asset management is foundational to cybersecurity. Look behind many of the breaches and you’ll find a single, ...
IBM Launches Security Assessment Service Focused on Business Risk
IBM Security this week launched a service through which it will work with IT security professionals to assess the business risks cybersecurity vulnerabilities represent. Julian Meyrick, vice president for IBM Security, said ...
The Value of Cybersecurity Ratings for CFOs
Security ratings may not be as well-known outside the security world, but in a nutshell, they evaluate an organization’s cybersecurity risk using data-driven metrics that provide visibility into an organization’s security posture ...
How to Stop Data Breaches of Your Cloud Data
The post How to Stop Data Breaches of Your Cloud Data appeared first on CCSI ...
Exposing the Culture of Compliance Cramming
Thursday, Feb. 1, marked the deadline for businesses to adopt the new industry standard, PCI DSS 3.2, aimed at reducing cyberattacks and promoting a better response to cyberattacks that result in payment ...

