Blog
Literary Antidotes for Today's Security Snake Oil
Threat Modeling
A Look at RACI Models within Application Threat Modeling
In this model, you will see engineers, network professionals, developers, architects, business analysts, project managers, security champions, pentesters, and quality assurance engineers. Because they all have some level of involvement and collaboration at different stages of application, as well as organizational, threat modeling ensures effective results.
Learn MoreThe General Data Protection Regulation (GDPR): A Quick Guide for Organizations
GDPR is an encompassing regulation and policy chan...
Why Healthcare is an Attractive Target for Malicious Actors
The global healthcare sector suffers more breaches...
Incident Response: When The General Data Protection Regulation (GDPR) Requires Action
When an organization suffers a security incident t...
How to Manage & Monitor Your Cloud Infrastructure
Operating your cloud infrastructure isn’t a one-...
HIPAA with the Security Experts
Join VerSprite and Hall Booth and Smith for the 4t...
Medical Record Retention Across States (HIPAA / HITECH)
The retention of medical records is, unfortunately...
Anti-Nausea Medicine for LastPass, Password Management FUD
Another breach notification, another opportunity f...