A roundup of the top news stories in information security this week, including a new Apache vulnerability that's similar to Heartbleed, and a new study sheds light on the costs of data breaches for U.S. enterprises.
Latest Content From MISTI
Mark Bulter discusses how security leaders can leverage media attention to accelerate the security program and drive innovation.
Tips and tools on how to create a robust and useful audit report that gets read.
As SOX turns 15 this fall, let’s widen the lens to capture what SOX is really about: its history, its goals, and the most important points to remember for an effective SOX compliance experience.
“Defray” ransomware is making its way around the healthcare industry, proving that cyber criminals still need only target low-hanging fruit.
Just like a huge obstacle course requires solid preparation, successful fieldwork requires deliberate planning.
Equifax committed so many infosec data breach sins, but delaying public notification is probably not one of them.
Auditors who can implement any one of the following strategies should yield both improved control coverage and lower costs.
The Five Whys is one of the simplest tools for cause analysis. It is easy to use, and the approach consists of asking “why” multiple items, each of which probes further into the source of the problem.
Good content is necessary, but ensuring that good content is written well is another experience on its own. Here, we dive into three areas that improve sentence flow: topic sentences, transitions, and filler phrases.
15 years into the SOX compliance era, more boards, CEOs, and risk managers want to leverage all that investment and spring into ERM.