CBI Blog

CBI Blog

Finding Threats on Your Network: Hunt or Be Hunted

Posted by Tony Bradley on Jun 8, 2016 3:31:56 PM

Guest Author: Tony Bradley
Originally Published: 5/5/2016

Is your network secure right now? Have any of your PCs or mobile devices been compromised? Before you even attempt to answer these questions, you need to pause and ask yourself: Can you actually answer either of these questions with any degree of certainty? Think hard about that one—because your job may depend on it.

Read More

Topics: Compliance, data breaches, IT Security, Network Security, Tenable, Vulnerabilty

The Perfect Storm: Managing the Vendor Risk Management Beast in Financial Institutions

Posted by Jivika Govil on Apr 4, 2016 1:13:34 PM

The rising movement of audit and regulatory screening of financial institutions – which was triggered by global financial crisis in the past – has now reached beyond insurance companies, commercial banks and investment trusts. The tide of major bank agencies (Office of the Comptroller of the Currency, Consumer Financial Protection Bureau, Federal Deposit Insurance Corp. and Federal Reserve) have required banks to increase the oversight of vendors which are deemed crucial to their operations.

Read More

Topics: Compliance, cybersecurity, Risk Management, Vendor Management

Top 5 Failures in Healthcare Information Security

Posted by Michael Pearson on Feb 19, 2016 2:31:00 PM

Prior to the Health Insurance Portability and Accountability Act  (HIPAA) being enacted in August  1996, no widely accepted set of security standards for protecting healthcare information existed. About same time, the Internet was exploding, and the healthcare industry began to move away from paper-based operations, towards a heavy use of electronic data systems. 

Read More

Topics: Compliance, healthcare, HIPAA

Building Better HIPAA Security with Penetration Testing

Posted by Michael Pearson on Dec 10, 2015 1:11:00 PM

The Need for Penetration Testing HIPAA Security Controls
In 2015, Healthcare providers became the leading industry of data breaches. As healthcare continues its evolution to a digital, on-demand data-driven service, the industry will continue to see increased pressures to protect patient data. The Health Insurance Portability and Accountability Act (HIPAA) serves as the backbone of regulation in this space. Like most regulations there are gaps in the language and a proper defense posture isn’t detailed. 

Read More

Topics: Compliance, healthcare, HIPAA, Pentesting

2015 Symantec Threat Report – Analysis and Commentary

Posted by John Beeskow on May 7, 2015 9:06:00 AM

Trends to Guide Your IT Risk Management Roadmap

Symantec has published their 20th Internet Security Threat Report , it’s a summary of the threat landscape over the previous 12 months, highlighting trends in vulnerabilities, breaches, and cybercrime. Additionally, new areas of focus for information security leaders and business executives are highlighted to raise awareness for the next year. You can get more details on the report and a copy of the full report here. This is an excellent report, and one that I highly recommend you take a few moments to review. Trends that stood out to me within the report include:

Read More

Topics: Symantec, Compliance, cybersecurity, IT Security, Network Security, IT Risk Management

Would you like to Contact Us?

Subscribe to CBI Blog Notifications

Connect with a Cyber Security Expert