
June 09, 2022
The more data you use, the more data you find you’ll need. This leads to hard decisions about what investments to make in data projects, technology....
Blog

May 26, 2022
What if queries could be written in one language and translated into over 20 others? This would reduce the learning curve to request specific....
Blog

May 20, 2022
Optiv’s Micheal Steele shares insights gained from over 10 years of experience in cyber operations and privileged access management.
Blog

May 16, 2022
The REvil Ransomware group’s reemergence isn’t a surprise, given the context of the Ukraine invasion.
Blog

May 11, 2022
Our new vulnerability and asset scoring mechanism more accurately identifies business risk associated with vulnerabilities.
Blog

May 09, 2022
In this series, we explain the threats, issues and impacts associated with managing third-party organizations and discuss how best to minimize risk.
Blog

May 03, 2022
This post highlights different tools and approaches for testing thick client applications for vulnerabilities.
Blog

April 26, 2022
PCI DSS v4.0 permits the traditional method and a new customized approach. Organizations should consider which best suits their requirements.
Blog

April 20, 2022
The Cyber Incident Reporting for Critical Infrastructure Act requires organizations to report cybersecurity incidents within 72 hours.
Blog

April 14, 2022
The new Gramm-Leach-Bliley Act (GLBA) Safeguards Rule is much more prescriptive and has more “teeth.” The compliance deadline is December 9, 2022.
Blog

April 12, 2022
The new Payment Card Industry Data Security Standard – version 4.0 – has been released. This post explores the details of the new standard.
Blog

April 12, 2022
A new agreement will allow the transfer of Europeans’ personal data to the U.S. This post offers advice for affected organizations.
Blog