Key Considerations for Assessing GDPR Compliance

Key Considerations for Assessing GDPR Compliance

The European Union General Data Protection Regulation (GDPR), which took full effect in May this year, solidifies the protection of data subjects’ “personal data,” harmonizes the data privacy laws across Europe and protects and empowers EU citizens’ data privacy, in addition to changing the way data is managed and handled by organizations. The GDPR regulation [...]

The Path to Improved Cybersecurity Culture

The Path to Improved Cybersecurity Culture

The recent ISACA-CMMI Institute cybersecurity culture research illustrates the accomplishments and gaps that are seen in organizations’ cybersecurity culture. The survey-driven research focuses on culture and continuous improvement, both essential components to a successful cyber risk management program. In this blog post, I will highlight some of the survey’s findings and then discuss ways you can improve [...]

Guideline on Effectively Managing Security Service in the Cloud

Guideline on Effectively Managing Security Service in the Cloud

The cloud computing market is growing ever so rapidly. Affordable, efficient, and scalable, cloud computing remains the best solution for most businesses, and it is heartening to see the number of customers deploying cloud services continue to grow. From the beginning of cloud’s existence, cloud service security has been among the top concerns of deployment. [...]

CCSK in the Wild: Survey of 2018 Certificate Holders

CCSK in the Wild: Survey of 2018 Certificate Holders

Even as more organizations migrate to the cloud, there’s still a concern as to how well those cloud services are being secured. According to an article by Forbes “66% of IT professionals say security is their greatest concern in adopting a cloud computing strategy.” As you embark on your quest to fill this skills gap, you may [...]

Shedding Light on the Dark Web

Shedding Light on the Dark Web

The Dark Web is the part of the internet that is inaccessible by conventional search engines and requires special anonymizing software to access. In colloquial terms, these are the darkest corners of the internet, where a widespan of nefarious activity takes place, as highlighted in the graphic below. The Dark Web raises many questions, even [...]