With the iPhone X and security in the news, organizations must address FaceID, password management, and information security compliance concerns.
Read MoreBlog
5 Compliance Lessons Learned from the Equifax Breach
While news outlets focus on customers, companies need to focus on the compliance lessons learned from the Equifax breach to protect themselves.
Read MoreHITRUST Framework Helps HIPAA and Vendor Management: Bloody Fingerprint Problem
The HITRUST Framework helps HIPAA and vendor management problems by creating a prescriptive and scalable way to protect PHI and ensure others do as well.
Read MoreCompliance Reporting Metrics: Moving Away from Emojis
Compliance reporting metrics offer stakeholders a shared language for assessing compliance. ISO 27004:2016 provides guidelines for quantitative analysis.
Read MoreSegregation of Duties in IT: Ya Gotta Keep ‘Em Separated
ISO/IEC 27001 requires segregation of duties in IT to be compliant. Audit and automation can help with the separation of functions to achieve compliance.
Read More