Our Thoughts On

Sort by

Categories
Authors

Cybersecurity

Articles 221 - 230 of 288

Using Your Mail Server Against You

Occasionally on penetration testing/ethical hacking engagements we encounter misconfigured mail servers which creates an opportunity to either gather information

California First to Require IoT Security

The majority of cyber-attacks are not targeted, rather they are opportunistic, using automated phishing and vulnerability scans. Attackers usually identify

Better Understanding PCI Penetration Testing Requirements

If your company takes credit cards, you may be wondering if you are required to have a penetration test. In the past, it had been voluntary, but with PCI

What is the SEC Looking For in Your Internal Control Environment?

This Article was co-written by Nicole Saldamarco At the recent AICPA year-end conference, SEC staff members indicated that they will be looking more closely
Register to receive our weekly newsletter with our most recent columns and insights.

Understanding Cyberthreats in our Energy Infrastructure

Cybercrime Motive Most cyberattacks are simply motivated by money – revenue from cybercrime has reached nearly $1.5 trillion per year. The majority

Addressing Technology Risks within the Financial Services Industry

As rapidly as technology evolves, so does the inherent risk surrounding that technology. It has now become ever so critical to ensure appropriate mitigation

Don't Acquire the Data Breach - The Importance of Cybersecurity and Information Technology Due Diligence

Co-Authored by: Eric Fair As businesses evolve through mergers and acquisitions (M&A), the ever-changing technology landscape continues to provide
Cybersecurity, SOC
Mark Riley | 12.10.2018

SOC 2 Examinations - What Are the Trust Services Criteria and Categories?

The 2017 Trust Services Criteria (TSC), which superseded the 2016 Trust Services Principles and Criteria (TSPC), serves as the control criteria for attestation
Register to receive our weekly newsletter with our most recent columns and insights.

Amazon Money Laundering Scam

An apparent fraud scheme has been uncovered that involves scammers’ use of CreateSpace, Amazon’s self-publishing service, to sell fake books

FDIC Information Technology Risk Examination (InTREx) Program Overview

The FDIC’s Information Technology Risk Examination (InTREx) Program is its current information technology and IT operations examination procedures.
Register to receive our weekly newsletter with our most recent columns and insights.

This site uses cookies to ensure that we give you the best user experience. Cookies assist in navigation, analyzing traffic and in our marketing efforts as described in our Privacy Policy.

×