Measuring Risk The definition of Risk is: risk = likelihood x impact. This formula is not abstract and makes sense….
it security audit
IT Risk Assessment Benefits 1. Documents Due Diligence An IT Risk Assessment provides verification and validation of an organization’s adherence to…
Penetration Test vs. Vulnerability Assessment What I learned in the Sea Services (Marines) is that a ship can carry a…
The Payment Card Industry (PCI) Council has updated their guidance on penetration testing. The guidance provides specifics about misconceptions surrounding…
Town of Tewksbury MA Pays to get rid of Ransomware Infection. Here we go again. Looks like the Tewksbury Police…
The Federal Financial Institutions Examination Council (FFIEC) released statements on ways that financial institutions can identify and mitigate cyber attacks…
According to a statement issued by Premera Blue Cross, a hacker was able to gain unauthorized access to its Information…
According to a survey conducted in December and released recently by Sungard, IT professionals believe their organizations aren’t doing enough…
Cisco has identified a vulnerability that could allow an unauthenticated, remote attacker to cause a denial of service condition. The…
Apparently, Spear Phishing has just arrived in New Zealand. According to a memo just issued by the New Zealand National…