4 Steps for Assessing Your NERC CIP Compliance Program

The North American Electric Reliability Corporation Critical Infrastructure Protection (NERC CIP) Standards are a cybersecurity compliance framework designed to protect utility organizations. Adhering to these guidelines is essential—falling short will… Continue reading 4 Steps for Assessing Your NERC CIP Compliance Program

Steps for PCI DSS Gap Analysis

Complying with Standards drawn by the Payment Card Industry Security Standards Council can be complicated and time-consuming. But, with a PCI DSS Gap Analysis, the process becomes a lot easier, streamlined, and less exhaustive. PCI Gap Analysis is the … Continue reading Steps for PCI DSS Gap Analysis

PCI DSS: SSL Certificate Management Requirements | Keyfactor

For IT and security teams, compliance ranks at the top of the priority list. If you’re responsible for handling key and certificate management in your organization, you know this all too well. 
PCI DSS is one of the most common and widely adopted … Continue reading PCI DSS: SSL Certificate Management Requirements | Keyfactor

Cybersecurity Predictions for 2021

Security, risk and anti-fraud experts from across RSA predict the emerging cybersecurity trends and challenges for 2021.
The post Cybersecurity Predictions for 2021 appeared first on Security Boulevard.
Continue reading Cybersecurity Predictions for 2021

CYBER Rules: DOD’s DFARS and CMMC Explained

Cybersecurity expert Rob Knake informally interviews top cybersecurity lawyer Evan Wolff regarding an important change to the Cyber Maturity Model Certification (CMMC).
On November 30th, the Department of Defense (DOD) Defense Federal Acquisition … Continue reading CYBER Rules: DOD’s DFARS and CMMC Explained

7 Challenges that Stand in the Way of Your Compliance Efforts

Compliance is very important to any organization. Organizations have many standards to choose from including PCI, CIS, NIST and so on. Oftentimes, there are also multiple regulations that are applicable in any country. So, organizations need to commit … Continue reading 7 Challenges that Stand in the Way of Your Compliance Efforts

Avionics Safety and Secured Connectivity: A Look at DO-326A/ED-202A, DO-355 and DO-356

One of the major improvements that the avionics industry is undergoing is an Internet of Things (IoT) upgrade. And this is inevitably affecting how airlines approach aircraft safety. From the beginning, safety has been paramount to the aviation industr… Continue reading Avionics Safety and Secured Connectivity: A Look at DO-326A/ED-202A, DO-355 and DO-356

How CMMC Measures Up to Other Compliance Frameworks

If you’re reading this post, chances are you have been through a regulatory compliance push before. And you’re probably hoping that (at least) some of your previous efforts will count towards newer frameworks, like the Cybersecurity Maturity Model… Continue reading How CMMC Measures Up to Other Compliance Frameworks

UAE’s Information Assurance Regulation – How to Achieve Compliance

For years, the United Arab Emirates (UAE) has committed itself to adopting information technology (IT) and electronic communication. The UAE’s Telecommunications Regulatory Authority (TRA) noted that this policy has made the state’s government agencies… Continue reading UAE’s Information Assurance Regulation – How to Achieve Compliance

Achieving Compliance with Qatar’s National Information Assurance Policy

Qatar is one of the wealthiest countries in the world. Finances Online, Global Finance Magazine and others consider it to be the wealthiest nation. This is because the country has a small population of under 3 million but relies on oil for the majority… Continue reading Achieving Compliance with Qatar’s National Information Assurance Policy