WEBINAR: Best Practices in Breach Identification, Investigation, and Notification
WEBINAR: Best Practices in Breach Identification, Investigation, and Notification

Data Breach is one of the worst nightmares that organizations … Read More
Consumer Rights Under CDPA
Consumer Rights Under CDPA

Virginia became the second state in the US to enact … Read More
How to Create an Effective Business Continuity Plan?
How to Create an Effective Business Continuity Plan?

Listen Audio Version What is a Business Continuity Plan? A … Read More
What are Complementary User Entity Controls in SOC Reports?
What are Complementary User Entity Controls in SOC Reports?

Explore the evolving landscape of User Control Considerations (formerly known … Read More
Multi-Tier Cloud Security Singapore Standard (SS584)
Multi-Tier Cloud Security Singapore Standard (SS584)

The Multi-Tier Cloud Security (MTCS) Singapore Standard (SS) also known … Read More
Importance of Sampling in the Audit Process
Importance of Sampling in the Audit Process

 In a compliance audit process, forming an audit opinion or … Read More
Common Web Application Security Vulnerabilities or Threats
Common Web Application Security Vulnerabilities or Threats

A Web Application is a computer program that utilizes Web … Read More
Best PCI Compliance Webinars of VISTA InfoSec
Best PCI Compliance Webinars of VISTA InfoSec

  PCI Compliance is a complex standard to navigate for … Read More
SAMA Cyber Security Maturity Model in a Nutshell
SAMA Cyber Security Maturity Model in a Nutshell

Assessing the maturity level of an organization’s Cyber Security program … Read More
Types Of Vulnerability Assessment?
Types Of Vulnerability Assessment?

  What is a vulnerability assessment? A Vulnerability Assessment is … Read More
How Does Implementing Network Segmentation Benefit Businesses?
How Does Implementing Network Segmentation Benefit Businesses?

Businesses today are still struggling to get a grip of … Read More
SOC 2 Privacy Criteria vs GDPR
SOC 2 Privacy Criteria vs GDPR

Data Privacy has recently been the top focus point among … Read More
SAMA Cyber Security Framework in Brief
SAMA Cyber Security Framework in Brief

Listen Audio Version   Cyber Security has for long been … Read More
6 reasons Why Penetration Test is Important
6 reasons Why Penetration Test is Important

  What is Penetration Testing? A Penetration Test is a … Read More
Benefits of  ISO 27001 Certification
Benefits of ISO 27001 Certification

The International Organization for Standardization (ISO) is a global standard … Read More