Penetration Tests vs. Vulnerability Scans: Understanding the Differences

Penetration tests and vulnerability scans are related but different cyber security services The difference between penetration tests and vulnerability scans is a common source of confusion. While both are important tools for cyber risk analysis and are… Continue reading Penetration Tests vs. Vulnerability Scans: Understanding the Differences

Cyber Security Lesson Brief from the Under Armour Breach

The Under Armour breach provides lessons in the do’s and don’ts of enterprise cyber security and compliance with the EU GDPR Last week, athletic apparel manufacturer Under Armour announced that its popular MyFitnessPal weight loss and fitne… Continue reading Cyber Security Lesson Brief from the Under Armour Breach

Tax Phishing Scams Are Back: Here Are 3 to Watch Out For

This Year’s Crop of Tax Phishing Scams Target Individuals, Employers, and Tax Preparers Tax season is stressful enough without having to worry about becoming the victim of a cyber crime. Here are three different tax phishing scams targeting emplo… Continue reading Tax Phishing Scams Are Back: Here Are 3 to Watch Out For

Crypto-Mining Malware May Be a Bigger Threat than Ransomware

Crypto-Mining Malware is Crippling Enterprise Networks Cryptocurrencies such as Bitcoin and Ethereum have gone mainstream; it seems like everybody and their brother is looking to buy some crypto and get their piece of the digital currency gold rush. Ha… Continue reading Crypto-Mining Malware May Be a Bigger Threat than Ransomware

Post Equifax, New Data Breach Notification Laws are Inevitable

New data breach notification regulations aren’t a matter of if, but when The U.S. Securities and Exchange Commission plans to update its six-year-old guidelines regarding data breach notification and cyber risk disclosure, Bank Info Security repo… Continue reading Post Equifax, New Data Breach Notification Laws are Inevitable

Cyber New Year’s Resolutions: Cyber Security Tips for 2018

Cyber Security Tips for 2018 and Beyond Now that the year is coming to an end, all eyes are on what’s possibly around the corner. More attacks on cryptocurrencies? An escalation in attacks by state-sponsored cyber criminals? Chaos as the EU&#8217… Continue reading Cyber New Year’s Resolutions: Cyber Security Tips for 2018

FISMA, FedRAMP, and NIST: Federal Compliance Demystified

FISMA vs. FedRAMP and NIST: Making Sense of Government Compliance Standards FISMA, FedRAMP, NIST, DFARS, CJIS, HIPAA … Government compliance standards can seem like a veritable alphabet soup. Making matters even worse, a lot of them overlap, and many organizations aren’t certain which standards they need to comply with. Even if your organization does not… Read More

The post FISMA, FedRAMP, and NIST: Federal Compliance Demystified appeared first on .

The post FISMA, FedRAMP, and NIST: Federal Compliance Demystified appeared first on Security Boulevard.

Continue reading FISMA, FedRAMP, and NIST: Federal Compliance Demystified

FISMA, FedRAMP, and NIST: Federal Compliance Demystified

FISMA vs. FedRAMP and NIST: Making Sense of Government Compliance Standards FISMA, FedRAMP, NIST, DFARS, CJIS, HIPAA … Government compliance standards can seem like a veritable alphabet soup. Making matters even worse, a lot of them overlap, and many organizations aren’t certain which standards they need to comply with. Even if your organization does not… Read More

The post FISMA, FedRAMP, and NIST: Federal Compliance Demystified appeared first on .

The post FISMA, FedRAMP, and NIST: Federal Compliance Demystified appeared first on Security Boulevard.

Continue reading FISMA, FedRAMP, and NIST: Federal Compliance Demystified