Posts tagged Compliance

CIS Critical Security Control 19: Steps for Crafting an Efficient Incident Response and Management Strategy

Detection and Response

CIS Critical Security Control 19: Steps for Crafting an Efficient Incident Response and Management Strategy

Christy Draicchio's avatar

Christy Draicchio

GDPR Preparation March and April:  Course Correct

Detection and Response

GDPR Preparation March and April: Course Correct

Sam Humphries's avatar

Sam Humphries

Tonight I'm gonna IR like it's 99 (days until GDPR)…

Exposure Management

Tonight I'm gonna IR like it's 99 (days until GDPR)…

Sam Humphries's avatar

Sam Humphries

HIPAA Security Compliance Fallacies (And How To Avoid Them)

Security Operations

HIPAA Security Compliance Fallacies (And How To Avoid Them)

kevinbeaver's avatar

kevinbeaver

GDPR Preparation Checklist: January – Teach and Tidy

Exposure Management

GDPR Preparation Checklist: January – Teach and Tidy

Sam Humphries's avatar

Sam Humphries

GDPR Compliance Checklist: December – Assess & Review

Exposure Management

GDPR Compliance Checklist: December – Assess & Review

Sam Humphries's avatar

Sam Humphries

GDPR Preparation: November – Form & Storm

Exposure Management

GDPR Preparation: November – Form & Storm

Sam Humphries's avatar

Sam Humphries

NIST Standards and Why They Matter

Exposure Management

NIST Standards and Why They Matter

Rapid7's avatar

Rapid7

The CIS Critical Security Controls Explained - Control 6: Maintenance, Monitoring and Analysis of Audit Logs

Exposure Management

The CIS Critical Security Controls Explained - Control 6: Maintenance, Monitoring and Analysis of Audit Logs

Cindy Jones's avatar

Cindy Jones

Maximizing PCI Compliance with Nexpose and Coalfire

Exposure Management

Maximizing PCI Compliance with Nexpose and Coalfire

Dirk Anderson's avatar

Dirk Anderson

New and Improved Policy Manager

Industry Trends

New and Improved Policy Manager

Jane Man's avatar

Jane Man

Top 3 Takeaways from the "PCI DSS 3.0 Update"

Exposure Management

Top 3 Takeaways from the "PCI DSS 3.0 Update"

Kelly Garofalo's avatar

Kelly Garofalo

Simplify Vulnerability Management with Nexpose 5.6

Exposure Management

Simplify Vulnerability Management with Nexpose 5.6

rpoppa's avatar

rpoppa

Malicious SSIDs And Web Apps

Vulnerabilities and Exploits

Malicious SSIDs And Web Apps

rapidmb's avatar

rapidmb

5 NON-TECHNICAL REASONS ORGANIZATION GET BREACHED

Exposure Management

5 NON-TECHNICAL REASONS ORGANIZATION GET BREACHED

dmorash's avatar

dmorash

Creating a PCI 11.3 Penetration Testing Report in Metasploit

Exposure Management

Creating a PCI 11.3 Penetration Testing Report in Metasploit

Christian Kirsch's avatar

Christian Kirsch

PCI Compliance Dashboard - New version including SANS Top20 Critical Security Controls

Exposure Management

PCI Compliance Dashboard - New version including SANS Top20 Critical Security Controls

Didier Godart's avatar

Didier Godart

Configuration Assessment and Policy Management in Nexpose 5.2

Industry Trends

Configuration Assessment and Policy Management in Nexpose 5.2

Leo Varela's avatar

Leo Varela

PCI DIY: How to do an internal penetration test to satisfy PCI DSS requirement 11.3

Exposure Management

PCI DIY: How to do an internal penetration test to satisfy PCI DSS requirement 11.3

Christian Kirsch's avatar

Christian Kirsch

What to do if your organization can't demonstrate four passing PCI internal or external scans

Exposure Management

What to do if your organization can't demonstrate four passing PCI internal or external scans

Didier Godart's avatar

Didier Godart

Disclosure, Destruction, and Denial

Security Operations

Disclosure, Destruction, and Denial

mjc's avatar

mjc