A checklist for SaaS vendors
Our manager’s company uses a lot of third-party vendors, and some of these relationships have been in place for years. What will happen when he goes back to assess their security risks?
View ArticleIn pursuit of HIPAA, a new compliance gap arises
Meeting requirements can be exhausting, but the business payoff can make it all worthwhile.
View ArticleStop Passing Around Those Passwords!
The company has sanctioned the use of an online password vault, so why is there a spreadsheet making the rounds that contains scores of passwords to servers that contain sensitive data?
View ArticleThe post-acquisition blues
The company calls in our manager to take a look around at a small software company it’s acquiring — after the deal has been signed.
View ArticleLet the budget games begin!
Even when top management is enlightened about the importance of good security practices, a security manager needs to go into the budget meeting prepared.
View ArticleUsing compliance as a tool for change
Our manager leverages gaps in security compliance to enhance the security program.
View ArticleTrouble spotted on the network
No sophisticated SOC? You can still be pretty sure that you’re aware of anything potentially troublesome.
View ArticleA nudge from ransomware
Our manager needs to get remote users’ PCs backed up without forcing them to connect to the network, which they rarely have to do these days to do their jobs.
View ArticleJust a test? If only!
The DDoS attack against DNS provider Dyn finds our manager without a backup plan. That’s painful, especially when the plan had been to test incident response soon.
View ArticlePutting security risks on simmer with Chef
A bit of automation can ease the PCI compliance burden.
View ArticleThe trouble with third-party assessments
If you let one customer perform security tests against your applications and network, you let yourself in for a lot of headaches.
View ArticleGetting buy-in to combat risk
A risk council with stakeholders from across the company could be an effective way to get needed resources to mitigate the worst security risks.
View ArticleRSA Conference is a timesaver
For our manager, the annual security gathering is a great way to get quality time with vendors.
View ArticleEmail, email, in the cloud
The transition from on-premises to cloud-based email is an opportunity to tighten security controls.
View Article
More Pages to Explore .....