Blog Posts

PCI-DSS, cybersecurity, framework Christian Grupp PCI-DSS, cybersecurity, framework Christian Grupp

Who needs to follow PCI-DSS?

When it comes to Payment Card Industry Data Security Standards (PCI-DSS), there are certain individuals and organizations that are required to follow them. These standards were created to ensure that all entities that accept, process, store or transmit credit card information maintain a secure environment and protect sensitive data.

Read More
ITIL, ITSM, change management, framework, cybersecurity Christian Grupp ITIL, ITSM, change management, framework, cybersecurity Christian Grupp

What do ITIL, ITSM, and change management have to do with cybersecurity?

A comprehensive understanding of ITIL, ITSM, and change management is essential for any organization looking to strengthen its cybersecurity posture. These frameworks provide a structured approach for managing the entire lifecycle of IT services, from design and development to delivery and retirement.

Read More

What is the CIA Triangle in CyberSecurity?

The CIA triad is a widely accepted model in the cybersecurity industry that helps organizations ensure the confidentiality, integrity, and availability of their information systems and data. The acronym stands for Confidentiality, Integrity, and Availability, and each of these elements is considered to be the foundation of information security. In this blog post, we will explore each aspect of the CIA triad in detail and how they are essential to protecting your organization's information assets.

Read More
cybersecurity, state of, 2023 Christian Grupp cybersecurity, state of, 2023 Christian Grupp

The state of CyberSecurity in 2023

In the last few years, the cybersecurity landscape has undergone significant changes and the threats to businesses and individuals are becoming more sophisticated and frequent. As we move into 2023, it's important to understand the current state of cybersecurity and the challenges that organizations will face in the coming year. In this blog post, we will discuss the key trends and challenges in cybersecurity for 2023 and what steps can be taken to protect against them.

Read More

What is a sample vendor due diligence process and checklist?

Vendor due diligence is a critical process for any business, regardless of size or industry. It involves thoroughly reviewing and evaluating a potential vendor or third-party partner before entering into a business relationship with them. This process is essential for ensuring that the vendor can meet the organization's needs while also maintaining the security and integrity of sensitive data. In this blog post, we will go over a sample vendor due diligence process and checklist that can be used to evaluate potential vendors.

Read More

What are some practical steps in vendor due diligence?

Vendor due diligence is a crucial process for any organization looking to establish a working relationship with a third-party vendor. It involves thoroughly evaluating a vendor's security practices, policies, and overall trustworthiness to ensure that they align with your organization's cybersecurity standards and expectations.

Read More
audit, cybersecurity, ISO 27001, soc 2, hipaa, PCI-DSS Christian Grupp audit, cybersecurity, ISO 27001, soc 2, hipaa, PCI-DSS Christian Grupp

What are the most common cybersecurity audits for businesses? How do they differ?

Cybersecurity audits are an essential aspect of protecting a business from cyber threats. These audits help businesses identify vulnerabilities in their systems and networks, and provide guidance on how to mitigate those risks. There are several different types of cybersecurity audits that businesses can choose from, each with its own unique set of pros and cons.

Read More
cybersecurity, password manager Christian Grupp cybersecurity, password manager Christian Grupp

What are the pros and cons of using a password manager?

A password manager is a software application that helps users to securely store and manage their passwords. These tools have become increasingly popular as the number of online accounts and services that require a login continues to grow. But like any software, a password manager comes with its own set of pros and cons.

Read More
pentest, offense, sql injection, TT&P, cybersecurity Christian Grupp pentest, offense, sql injection, TT&P, cybersecurity Christian Grupp

What is SQL Injection?

SQL injection is a type of cyber attack that exploits a vulnerability in the way a website or application interacts with a database. It allows an attacker to insert malicious code into a SQL statement, which is then executed by the database. This can give the attacker access to sensitive information, such as passwords, personal data, and even financial information.

Read More