A rogue access point is a wireless access point installed on a secure network without the knowledge of the system administrator.
Learn what a forensic investigation accomplishes and how much it might cost.
This blog will cover the three types of HITRUST CSF certifications. It will also cover what you can expect to achieve upon completion of each type of assessment and general guidelines of which assessment is best for your organization.
pci dss compliance for service providers is necessary if your organization provides services to merchants that may affect the security of their merchant payment data.
PCI Requirement 11 discusses vulnnerability scanning and penetration testing.
Do You Need a Web Application Penetration Test? It’s important for your business to find and remediate any vulnerabilities your web applications may have. This is where web application penetration testing comes in.
We outline the penetration testing process in detail and answer some of the most frequently asked questions related to this important security test.
Read this blog to help you determine what type of penetration test is best for your business.
What is it like working with SecurityMetrics? SecurityMetrics’ central objective is to help companies secure their data, not just meet compliance standards. We love working with organizations who have that same vision for security.
Why Partner with SecurityMetrics for Data Security and Compliance?
An Out-of-band XML External Entity attack, CVE-2019-10718, exists on BlogEngine.NET versions 3.3.7 and earlier through the /pingback.axd endpoint.
For many small business owners, cybersecurity budgets can be very limited. Finding a cybersecurity program can help you get the most value for your money.
This blog discusses how the SecurityMetrics HIPAA Portal can help with your HIPAA requirements.
Host and Principal Security Analyst Jen Stone (MCIS, CISSP, CISA, QSA) brings on guests with unique viewpoints that are important to the entire security and payments ecosystem.
This blog discusses ransomware trends and what to do about ransomware.
Here are the top 5 PCI questions we get from franchisers and franchisees about PCI compliance.
The DDoS Threat Landscape is evolving at a record pace. So how can you be prepared for this risk in your business?
The following guidance will help you understand the major steps involved in firewall configuration.
The HIPAA Security Rule requirements are vast. To help you prioritize your security, we’ve put together the ten mistakes that organizations make when it comes to HIPAA security compliance.
Like other privacy laws, CCPA includes some basic tenets of data protection as well as provisions to notify data subjects about the uses of their data, like who is going to see their data and when.
It’s important to note that the number of victims in each reported breach is not cumulative, these are each individual incidences, bringing the total between these three breaches to upwards of 1.4 billion victims.
Data Breach Statistics from 2018 and Predictions for 2019. How did our predictions from 2018 turn out and what you can do in 2019 to avoid a data breach.
Google Privacy Update - PII Can Now be Removed from Searches.
Heff and Forrest discuss how to know if an app is secure in this week's news.