Let’s unpack the symbiotic relationship between cybersecurity and video surveillance. In the fast-paced world of digital defense, understanding how these…
IT Assessment
Recently a new version of the Common Vulnerability Scoring System has been updated. The new system will provide a more…
The NIST Cybersecurity Framework (CSF), developed by the National Institute of Standards and Technology, plays a pivotal role in bolstering…
In a universe (not so far away), where passwords like “123456” and “password” reigned supreme, our hero, NIST 800-63B, stepped…
Measuring Risk The definition of Risk is: risk = likelihood x impact. This formula is not abstract and makes sense….
Receives 23 Months for Falsifying EHR Meaningful Use Attestation TYLER, TX—The former Chief Financial Officer of Shelby Regional Medical Center…
IT Risk Assessment Benefits 1. Documents Due Diligence An IT Risk Assessment provides verification and validation of an organization’s adherence to…
Penetration Test vs. Vulnerability Assessment What I learned in the Sea Services (Marines) is that a ship can carry a…
According to a recent publication by the United States Computer Emergency Readiness Team (US-CERT), they recommend as part of a…
The Payment Card Industry (PCI) Council has updated their guidance on penetration testing. The guidance provides specifics about misconceptions surrounding…