Beta Release of Assessment Accelerator

This week blog is a teaser to our beta-release of Assessment Accelerator (AA). We have been working hard on this productivity toolkit for all of the assessors out there to enhance and maximize your assessment process. From ISO to PCI DSS to FISMA, assessments require the assessors to systematically step through a series of controls, to review the implementation documented by the control owner and the corresponding evidence and workpapers for the control, and to make an independent determination if the control is effectively implemented. If the control is not effective or not satisfied, the identified risk and risk statements along with appropriate risk levels and recommendation must be doc

How Secure is Your Organization's Website?

An organization's website in many ways is similar to a cover of the book or a DVD to entice a potential customer to take a closer look at your offerings. For most organizations, the website also serves a possible gateway into its organizational infrastructure, and a source from which external threats can exploit to gain access to intellectual information and data assets with ultimate intent to profit from those exploits. How often have you consider the following: 1. Is my web web server correctly configured and my staff is aware and engage about securing my web site? 2. Do I know the vulnerabilities of my web sit and the effort behind their exploits? 3. What are my known and unknown risks?

Part 6: Blockchain Technology - Security

In Part 6 of this multipart series on blockchain technology, we will continue our discussion on the implications of blockchain technology. Let's get started! Security. Security risks for blockchain technology are similar to those experience in both public and private networks. The design of the network architecture and access control play crucial roles in reducing the insider threats to the network, by requiring a minimum number of participants or nodes to be properly connected, designated and authorized for participating in a Federated or private blockchain consensus process. Public blockchain are prone to 51% attack and therefore care should be taken to ensure the network has sufficient n

© 2017-2020 Caplock Security LLC

  • Twitter Social Icon
  • Black LinkedIn Icon