Knowledge Base

The Top 10 FinServ Data Breaches

The Top 10 FinServ Data Breaches Text Consumers expect banks and other financial services companies to provide an expert level of security when it comes to their sensitive data, and rightfully so. These companies...

Top 10 Biggest Healthcare Data Breaches of All Time

Top 10 Biggest Healthcare Data Breaches of All Time Text In the past five years, we’ve seen healthcare data breaches grow in both size and frequency, with the largest breaches impacting as many as 80 million people....

What is ITAR Compliance?

A Definition of ITAR Compliance Text International Traffic in Arms Regulations (ITAR) control the export and import of defense-related articles and services on the United States Munitions List (USML). According to...

What is an Intrusion Prevention System?

What is an Intrusion Prevention System? Text An intrusion prevention system (IPS) is a tool that is used to sniff out malicious activity occurring over a network and/or system. Intrusion prevention systems can also...

What is Insider Data Theft?

Data Theft Definition, Statistics and Prevention Tips Text Data theft is the act of stealing information stored on computers, servers, or other devices from an unknowing victim with the intent to compromise privacy...

What are Indicators of Compromise?

What are Indicators of Compromise? Text Indicators of compromise (IOCs) are “pieces of forensic data, such as data found in system log entries or files, that identify potentially malicious activity on a system or...

What is Incident Response?

What is Incident Response? Text Incident response is a term used to describe the process by which an organization handles a data breach or cyberattack, including the way the organization attempts to manage the...

What is HITECH Compliance?

Understanding and Meeting HITECH Requirements Text The Health Information Technology for Economic and Clinical Health Act (HITECH Act) was signed into law as part of the American Recovery and Reinvestment Act (ARRA)...

Healthcare Cybersecurity

Tips for Securing Private Health Data Text Protecting data in the healthcare industry is no easy feat. Healthcare providers and their business associates must balance protecting patient privacy while delivering...

What is FTP Security?

Securing FTP Usage Text File Transfer Protocol (FTP) is a standard network protocol used to transfer files between computers over the Internet. FTP is built on client-server architecture and was developed by Abhay...

What is File Sharing Security?

A Definition of File Sharing Security Text File sharing has grown in popularity and frequency as people work remotely and enterprises move to the cloud. However, any time employees use technology to share files...

What is File Fingerprinting?

What is File Fingerprinting? Text Document fingerprinting is performed by algorithms that map data such as documents and files to shorter text strings, also known as fingerprints. These fingerprints are unique...

The FFIEC Cybersecurity Assessment Tool

A Framework for Measuring Cybersecurity Risk and Preparedness in the Financial Industry Text The FFIEC Cybersecurity Assessment Tool (CAT) is a diagnostic test that helps institutions identify their risk level and...

What is Event Correlation?

Definition of Event Correlation Text Event correlation takes data from either application logs or host logs and then analyzes the data to identify relationships. Tools that utilize event correlation can then perform...

What is Endpoint Security?

A Definition of Endpoint Security Text Endpoint security is the process of securing the various endpoints on a network, often defined as end-user devices such as mobile devices, laptops, and desktop PCs, although...