Aug 29, 2018 | Risk Management, Vendor Assessments
SOC reports and Vendor Management By: Brianna Blanchard, Information Assurance Analyst Statement on Standards for Attestation Engagements (SSAE) audits are conducted by third party auditors and are used to document and evaluate internal controls. The SOC reports...
Aug 23, 2018 | Professional Services, Splunk
By: Dan Potter, Security Engineer Many organizations already leverage syslog for data collection. It’s easy to get up and running and get data logged to a file. However, when it comes to bringing this data in to Splunk, there are a few things that can help with...
Aug 17, 2018 | Penetration Testing
By: Randy Duprey What is Red Teaming? Red teaming in general can be defined as a goal-based adversarial testing process. The concept has existed since the sixth Century BCE when the ancient military genius Sun Tzu stated that “…one who knows the enemy and knows...
Aug 14, 2018 | Compliance, HIPAA, Information Security
By: Samantha Moench, Information Assurance Analyst Congress created the Health Insurance Portability and Accountability Act (HIPAA) and President Bill Clinton signed it into law in 1996. This act set national standards for protecting electronic healthcare transactions...
Aug 6, 2018 | Information Security
Original Author: Hunter Gregal Updated By: Justin Fimlaid A key concept in security is ensuring that your server’s operating system is adequately secured, or “hardened”. All too often server administrators will focus on security at their application...