Home Authors Posts by Ken Lynch

Ken Lynch

9 POSTS 0 COMMENTS
Ken Lynch is an enterprise software startup veteran, who has always been fascinated about what drives workers to work and how to make work more engaging. Learn more at ReciprocityLabs.com.
Security

Testing Controls & Gathering Evidence

Keeping up with PCI DSS (Payment Card Industry Data Security Standard) compliance is not easy. In fact, 80% of businesses fail their PCI DSS...
writing-hand-man-board-technology-internet-710487

What is NIST Risk Management

An Information System is a crucial pillar for every organization. It houses vital data required for the running of the firm. This system faces...
cloud computing vs Traditional IT systems

Difference Between Traditional IT Systems and Cloud Computing

Today, businesses are increasingly relying on data for their day to day operations. Therefore, it is crucial for organizations to have systems built on...
Risk assesment and mitigation

Important Steps For Performing a Cybersecurity Risk Assessment

In every company's risk management strategy, it is crucial that cyber-security risk assessment performed right; otherwise, the level of vulnerability to potential threat would...
writing-hand-man-board-technology-internet-710487-compressed

A Complete Guide to Mitigate Risk in Software Engineering

It can feel impossible to develop software and maintain its embedded security since you are potentially adding new vulnerabilities to the product as you...
compliance cost with automation

Solving Rising Compliance Costs with Automation

Following the recent passing of the Sarbanes-Oxley Act of 2002 (SOX) 15th anniversary, retrospectives raised the issue of increasing the cost of compliance. The...
Who's Really Responsible For Third-Party Vendor Breaches

Who’s Really Responsible For Third-Party Vendor Breaches?

Increasingly, suppliers, business partners, and third-party vendors are exposing you to more reputational and bottom line risks than ever before. Recent surveys provide a...
security-review-768x489 (1)

Sourcing responsibility to vendors could be your biggest mistake

The vast majority of companies use third-party vendors to help them with discrete elements of their business, and government departments in particular benefit from...
heartbeat-163709_1280-768x432

What Are The Penalties For Violating HIPAA Rules?

The Health Insurance Portability and Accountability Act (HIPAA) has been the law of the land in the United States since 1996 when it was...

Did you know?