Blog
Literary Antidotes for Today's Security Snake Oil
Threat Modeling
A Look at RACI Models within Application Threat Modeling
In this model, you will see engineers, network professionals, developers, architects, business analysts, project managers, security champions, pentesters, and quality assurance engineers. Because they all have some level of involvement and collaboration at different stages of application, as well as organizational, threat modeling ensures effective results.
Learn MoreTranslating Preventative Risk Mitigation to ROI
Guide to understanding the investment value of pre...
Why Context is King for Your Governance Program
Security is a process. It takes time to build a st...
Overview of OSINT and Its Importance for Businesses & Organizations
Open-source information is available through major...
Smishing and Vishing Explained: How Phone-Based Cyber Attacks Work
Smishing and vishing are types of phishing attacks...
Is Using Public WiFi Safe?
Using public WiFi can leave you and your employees...
How to Get Executive Buy-in for Your Security Program Budget
It can be difficult to make a case for security sp...
CISO as a Service: What is a vCISO and what are the benefits?
A Virtual CISO (vCISO) service provides an experie...
Informe sobre amenazas a la seguridad empresarial 2021
En este video, el autor de Envisions, Balam Mendoz...
2021 Business Security Threats Briefing
In this video, Envisions author, Balam Mendoza, an...
Attacking LastPass: Compromising an Entire Password Database
LastPass is a commonly used cloud-based password m...
10 Data Privacy Tips: Wellness Industry & Growing Data Concerns
Wellness providers will need to consider data priv...
5 Fundamental Data Privacy Rights
The ground-breaking California Consumer Privacy Ac...
The General Data Protection Regulation (GDPR): A Quick Guide for Organizations
GDPR is an encompassing regulation and policy chan...
Why Healthcare is an Attractive Target for Malicious Actors
The global healthcare sector suffers more breaches...
Incident Response: When The General Data Protection Regulation (GDPR) Requires Action
When an organization suffers a security incident t...