Sep 27, 2018 | Information Security, Professional Services, Splunk
By: Dan Potter, Senior Security Engineer If you’re just getting started be sure to check out Part 1 and 2 of our series: Data Onboarding Success Part 1 – Success with Syslog-NG and Splunk, The Install and Setup. Data Onboarding Success Part 2 – Success with Syslog-NG...
Sep 19, 2018 | Vendor Assessments
By: Paul Dusini, Information Assurance Manager CISOs, CIOs, and Risk Managers often understand the importance of vendor information security assessments but don’t know where to begin. I manage a team of analysts who perform vendor assessments, and we have experience...
Sep 11, 2018 | Information Security, Penetration Testing
Rewrite: Justin Fimlaid Original Author: Hunter Gregal Cross-site scripting, or otherwise known as XSS, is the most common web application vulnerability on the internet. I have found this to be true through both data research and personal experience during penetration...
Sep 6, 2018 | HIPAA, Risk Management
By: Mark Brisson, Information Assurance Analyst I often speak with healthcare organizations and have found that many are unsure of the difference between a HIPAA risk analysis and a HIPAA gap analysis as they related to the Security Rule. I’ve discovered that this is...