What Will Cybersecurity Look Like In 2028? By Default, By Design
Information security that’s simple? When security is baked into everything, by default and by design – it is possible. Anitian CEO Andrew Plato explains.
A Study in Exploit Development – Part 1: Setup and Proof of Concept
I was seeking an overflow vulnerability that could lead to remote code execution (RCE). I wanted a simple piece of software so it would be easier to debug and understand. Eventually I found a reported vulnerability for something called EasyChat. Here’s my test.
Top Five SOC 2 Compliance Questions Answered
What is the difference between the SOC 2 Type 1 and SOC 2 Type 2 Audit? Here’s the answer to that and four other common compliance questions.
How to Make PCI Compliance A Little Easier for Everyone
Before we begin, there’s one thing Anitian Director of Security Intelligence Jordan Wiseman wants to make clear: You can’t outsource all compliance, including PCI compliance.
The Human Firewall Is a Lie
Lately, I hear a lot of cybersecurity people talk about the need to strengthen the “human firewall.” My take: Security needs to start doing its job and stop blaming users.
GDPR Deadline Is Coming: 4 Big Steps to Prepare
On May 25th, 2018, the European Union’s General Data Protection Regulation (GDPR) (Regulation (EU) 2016/679) goes into effect. Here’s how to prepare.
Four Reasons Mega Cybersecurity Breaches Happen
A culture of breach involves poor leadership, lack of discipline, misguided focus & a cybersecurity checkbox mentality. Anitian explains the details.
What’s New In NIST 800-53 R5: Anitian Explains
NIST recently released a public draft of NIST 800-53 revision 5, Security & Privacy Controls for Information Systems & Organizations, Anitian reports.
ISO 27001 Part 3: Passing a Formal Audit to Get Certified
Anitian describes the ISO 27001 audit process and some important considerations surrounding the ISO compliance process.