Ken Lynch
Testing Controls & Gathering Evidence
Keeping up with PCI DSS (Payment Card Industry Data Security Standard) compliance is not easy. In fact, 80% of businesses fail their PCI DSS...
What is NIST Risk Management
An Information System is a crucial pillar for every organization. It houses vital data required for the running of the firm. This system faces...
Difference Between Traditional IT Systems and Cloud Computing
Today, businesses are increasingly relying on data for their day to day operations. Therefore, it is crucial for organizations to have systems built on...
Important Steps For Performing a Cybersecurity Risk Assessment
In every company's risk management strategy, it is crucial that cyber-security risk assessment performed right; otherwise, the level of vulnerability to potential threat would...
A Complete Guide to Mitigate Risk in Software Engineering
It can feel impossible to develop software and maintain its embedded security since you are potentially adding new vulnerabilities to the product as you...
Solving Rising Compliance Costs with Automation
Following the recent passing of the Sarbanes-Oxley Act of 2002 (SOX) 15th anniversary, retrospectives raised the issue of increasing the cost of compliance. The...
Who’s Really Responsible For Third-Party Vendor Breaches?
Increasingly, suppliers, business partners, and third-party vendors are exposing you to more reputational and bottom line risks than ever before. Recent surveys provide a...
Sourcing responsibility to vendors could be your biggest mistake
The vast majority of companies use third-party vendors to help them with discrete elements of their business, and government departments in particular benefit from...
What Are The Penalties For Violating HIPAA Rules?
The Health Insurance Portability and Accountability Act (HIPAA) has been the law of the land in the United States since 1996 when it was...