Christine Sublett - 07 June 2018
Security as Part of the M & A Due Diligence Process
Tags: CLOUD, DUE DILIGENCE, HIPAA, HITRUST, M & A, MERGERS & ACQUISITIONS, SECURITY, VALUATION
Technical and financial due diligence have long been a part of the review performed by an acquiring company prior to a merger or acquisition (M & A). Cyber security has finally become an important business concern, and this requires information […]
Christine Sublett - 29 June 2016
Vulnerability Assessment vs. Penetration Testing—Which One is Right for You?
Tags: BLACK BOX, BUSINESS ASSOCIATE, CROSS-SITE SCRIPTING, OWASP, PENETRATION TESTING, SECURITY, SQL INJECTION, VULNERABILITY ASSESSMENT, WHITE BOX
Many organizations conduct vulnerability assessments, while fewer conduct regular third-party penetration tests. Both are critical components of a Vulnerability and Threat Management program. Vulnerability assessments identify security vulnerabilities in an environment, such as applications, networks, etc. Testing should produce a prioritized list […]