Governors from 38 states have decided it’s time to take cybersecurity initiatives into their own hands.
Latest Content From MISTI
CASB was widely regarded as the quickest-growing market ever in cybersecurity, but what impact does it have today?
Because of the concentration of company data on ESXi/Hyper-V hosts, it becomes mission critical to secure your virtualization infrastructure accurately.
Why do some internal auditors effectively prepare workpapers and write audit reports with ease, yet stumble when it comes to most other forms of communication?
Marcus Ranum talks current firewall capabilities, what micro segmentation will solve (and what it won't), and the future of network security.
In our last article, we discussed how disciplines like psychology and behavior-profiling can help us to better understand the adversary at the end of the keyboard. Now we are going to extend similar disciplines to ourselves as intel analysts.
The proposed "Internet of Things Cybersecurity Improvement Act of 2017" signals a shift in attitudes about cybersecurity's impact on public safety.
How do our stakeholders on the board and in top management assess the value of internal audit? What do we give them? What do they have on which to base their assessment?
An audit is a complex undertaking that requires internal auditors to examine documents, speak with employees, observe business practices, and evaluate controls in business programs and processes.
In this exclusive video interview, Mike Spanbauer, VP of Security Test and Advisory, provides some helpful tips to security professionals when it comes to vetting security technology.
Customer service oriented internal audit departments are conducting surveys after audits to improve their own processes.