Data Protection in Thailand: A Summary of the PDPA

Data Protection Laws

Data Protection in Thailand: A Summary of the PDPA

HPE's Deputy CISO Discusses Cyber Workforce Development

Cyber Workforce

HPE's Deputy CISO Discusses Cyber Workforce Development

Tips for Improving Data Privacy Conversations in the Boardroom

Privacy Risk

Tips for Improving Data Privacy Conversations in the Boardroom

How to Build Obfuscated Macros for your Next Social Engineering Campaign

Threat and Vulnerability

How to Build Obfuscated Macros for your Next Social Engineering Campaign

How to Build a Cheap Active Directory Pen Test Lab in AWS Without Any Effort

Threat and Vulnerability

How to Build a Cheap Active Directory Pen Test Lab in AWS Without Any Effort

What Makes a Good Penetration Test?

Threat and Vulnerability

What Makes a Good Penetration Test?

A Closer Look at the AICPA’S SOC for Cybersecurity

Audit Insights

A Closer Look at the AICPA’S SOC for Cybersecurity

6 Tips for Getting Started with CCPA Compliance

Data Protection Laws

6 Tips for Getting Started with CCPA Compliance

SOC 1, SOC 2, or SOC 2+ - Which SOC Report Is Right for Your Organization?

Audit Insights

SOC 1, SOC 2, or SOC 2+ - Which SOC Report Is Right for Your Organization?

The MFA Vulnerability You May Be Missing

Threat and Vulnerability

The MFA Vulnerability You May Be Missing

Beyond the CCPA: Nevada's New Internet Privacy Law, SB 220

Data Protection Laws

Beyond the CCPA: Nevada's New Internet Privacy Law, SB 220

Beyond the GDPR: A Look at China's National Data Protection Standard

Data Protection Laws

Beyond the GDPR: A Look at China's National Data Protection Standard

How the CCPA Is Impacting State Data Protection Legislation in the U.S.

Data Protection Laws

How the CCPA Is Impacting State Data Protection Legislation in the U.S.

What Does the Brexit Extension Mean for Data Protection?

Data Protection Laws

What Does the Brexit Extension Mean for Data Protection?

What You Need to Know about Brazil’s New Personal Data Protection Regulation Now

Data Protection Laws

What You Need to Know about Brazil’s New Personal Data Protection Regulation Now

The GDPR in 2019: Enforcement and Penalties around the Globe

Data Protection Laws

The GDPR in 2019: Enforcement and Penalties around the Globe

Upgrading Your Internal Controls for a Hybrid Environment

Audit Insights

Upgrading Your Internal Controls for a Hybrid Environment

How to Use Privacy KRIs to Predict Future Risks

Privacy Risk

How to Use Privacy KRIs to Predict Future Risks

A New Tool for Finding Malicious JavaScript and Securely Using External Libraries

Threat and Vulnerability

A New Tool for Finding Malicious JavaScript and Securely Using External Libraries

8 Areas to Include in SAP Access Control Testing

Audit Insights

8 Areas to Include in SAP Access Control Testing

Let's Get Cracking: A Beginner's Guide to Password Analysis

Threat and Vulnerability

Let's Get Cracking: A Beginner's Guide to Password Analysis

5 Things to Consider before Upgrading from SAP GRC 10.x to GRC 12.0

Audit Insights

5 Things to Consider before Upgrading from SAP GRC 10.x to GRC 12.0

Top Trends in Third-Party Risk Management for 2019

Enterprise Risk

Top Trends in Third-Party Risk Management for 2019

A CCPA Update: Preparing for Public Forums and the Look-Back Requirement

Data Protection Laws

A CCPA Update: Preparing for Public Forums and the Look-Back Requirement

Data Privacy Day 2019: Privacy Trends to Watch in 2019

Privacy Risk

Data Privacy Day 2019: Privacy Trends to Watch in 2019

2018 in Review: A Year of Internal Penetration Testing

Cyber Risk

2018 in Review: A Year of Internal Penetration Testing

Prevention Is the Best Medicine: A Guide to SAP Security Health Checks

Audit Insights

Prevention Is the Best Medicine: A Guide to SAP Security Health Checks

Understanding the Differences between PIAs and the GDPR's DPIAs

Compliance

Understanding the Differences between PIAs and the GDPR's DPIAs

Adequacy Decisions, BCRs, and Whitelists: Understanding Cross-Border Data Transfers in the GDPR Era

Compliance

Adequacy Decisions, BCRs, and Whitelists: Understanding Cross-Border Data Transfers in the GDPR Era

Louisiana, Ohio, and Vermont Update Cyber Security and Privacy Laws

Data Protection Laws

Louisiana, Ohio, and Vermont Update Cyber Security and Privacy Laws

Three Ways Brexit Could Impact Data Protection in the UK

Compliance

Three Ways Brexit Could Impact Data Protection in the UK

The 5 Most In-Demand Cyber Security Jobs for 2019

Cyber Workforce

The 5 Most In-Demand Cyber Security Jobs for 2019

New Guidance: Protecting Data in the Age of Artificial Intelligence

Data Protection Laws

New Guidance: Protecting Data in the Age of Artificial Intelligence

What Is the Future of the EU-U.S. Privacy Shield?

Data Protection Laws

What Is the Future of the EU-U.S. Privacy Shield?

New Data Shows Cyber Security Talent Shortage Growing

Cyber Workforce

New Data Shows Cyber Security Talent Shortage Growing

Canada Updates PIPEDA Breach Notification Requirements

Data Protection Laws

Canada Updates PIPEDA Breach Notification Requirements

Record-Setting Fines Push HIPAA Into the Spotlight

Data Protection Laws

Record-Setting Fines Push HIPAA Into the Spotlight

Get Ready: Germany’s DPAs Are Starting Their GDPR Audits

Compliance

Get Ready: Germany’s DPAs Are Starting Their GDPR Audits

When Does HIPAA Apply to Health Apps?

Data Protection Laws

When Does HIPAA Apply to Health Apps?

The Hidden Benefits of Vendor Risk Management

Enterprise Risk

The Hidden Benefits of Vendor Risk Management

Understanding PHI Disclosures under the 21st Century Cures Act

Compliance

Understanding PHI Disclosures under the 21st Century Cures Act

Dr. Lori DeLooze, Cyber Security Pioneer and Defensive Security Expert

Cyber Workforce

Dr. Lori DeLooze, Cyber Security Pioneer and Defensive Security Expert

6 Key Changes in the New California Consumer Privacy Act Amendments

Data Protection Laws

6 Key Changes in the New California Consumer Privacy Act Amendments

Are Your Vendors GDPR Compliant?

Compliance

Are Your Vendors GDPR Compliant?

How to Spot Hidden Cyber Security Talent at your Company

Cyber Workforce

How to Spot Hidden Cyber Security Talent at your Company

Why the EU-Japan Data Transfer Agreement Is So Significant

Data Protection Laws

Why the EU-Japan Data Transfer Agreement Is So Significant

When is a DPIA Required under the GDPR?

Data Protection Laws

When is a DPIA Required under the GDPR?

Regulation Comparison: The California Consumer Privacy Act and the GDPR

Data Protection Laws

Regulation Comparison: The California Consumer Privacy Act and the GDPR

How to Use Vendor Profiles to Address Third-Party Risk

Privacy Risk

How to Use Vendor Profiles to Address Third-Party Risk

A Look at the New California Consumer Privacy Act of 2018

Data Protection Laws

A Look at the New California Consumer Privacy Act of 2018

What You Need to Know about Colorado’s New Data Protection Law

Data Protection Laws

What You Need to Know about Colorado’s New Data Protection Law

Quick FAQ: Responding to Data Subject Requests under the GDPR

Compliance

Quick FAQ: Responding to Data Subject Requests under the GDPR

4 Hurdles Standing between You and Effective Vendor Risk Management

Privacy Risk

4 Hurdles Standing between You and Effective Vendor Risk Management

How Leveraging ISO 27000 and NIST Frameworks Can Help You Align with the GDPR

Compliance

How Leveraging ISO 27000 and NIST Frameworks Can Help You Align with the GDPR

A Roundup of Our Most Popular GDPR Resources and Guides

Data Protection Laws

A Roundup of Our Most Popular GDPR Resources and Guides

What is Integrated Risk Management?

Enterprise Risk

What is Integrated Risk Management?

Data Privacy in Paradise: A Look at the Privacy Regulations of Bermuda and the British Virgin Islands

Data Protection Laws

Data Privacy in Paradise: A Look at the Privacy Regulations of Bermuda and the British Virgin Islands

Understanding the DPO and EU Representative Roles under the GDPR

Compliance

Understanding the DPO and EU Representative Roles under the GDPR

A PCI DSS Update Is Coming: What You Need to Know about PCI DSS v3.2.1

Cyber Risk

A PCI DSS Update Is Coming: What You Need to Know about PCI DSS v3.2.1

Beyond the GDPR: What You Should Know about Japan’s Act on the Protection of Personal Information

Data Protection Laws

Beyond the GDPR: What You Should Know about Japan’s Act on the Protection of Personal Information

Understanding the 4 Phases of the NYDFS Cybersecurity Regulation (23 NYCRR 500)

Cyber Risk

Understanding the 4 Phases of the NYDFS Cybersecurity Regulation (23 NYCRR 500)

What’s Inside South Dakota and Alabama’s New Data Breach Notification Laws?

Data Protection Laws

What’s Inside South Dakota and Alabama’s New Data Breach Notification Laws?

The ePrivacy Regulation and the GDPR: What You Need to Know Now

Data Protection Laws

The ePrivacy Regulation and the GDPR: What You Need to Know Now

Beyond the GDPR: What You Should Know about the Philippines’ Data Privacy Act of 2012

Data Protection Laws

Beyond the GDPR: What You Should Know about the Philippines’ Data Privacy Act of 2012

The Keys to a Seamless FASB ASC 842 Implementation

Audit Insights

The Keys to a Seamless FASB ASC 842 Implementation

What Are the Reasons Behind the Cyber Security Talent Shortage?

Cyber Workforce

What Are the Reasons Behind the Cyber Security Talent Shortage?

Does Your Marketing Strategy Align with the GDPR?

Compliance

Does Your Marketing Strategy Align with the GDPR?

A Step-by-Step Checklist for Meeting GDPR Consent Requirements

Compliance

A Step-by-Step Checklist for Meeting GDPR Consent Requirements

One RSA Session You Should Definitely Reserve a Seat For

Cyber Risk

One RSA Session You Should Definitely Reserve a Seat For

A Quick Guide to the Biggest Updates in the SEC's Guidance on Cyber Security Disclosures

Cyber Risk

A Quick Guide to the Biggest Updates in the SEC's Guidance on Cyber Security Disclosures

How Big Is the Cyber Security Talent Shortage?

Cyber Workforce

How Big Is the Cyber Security Talent Shortage?

9 Examples of Lawful Basis for Processing under the GDPR

Compliance

9 Examples of Lawful Basis for Processing under the GDPR

Christie Verscharen, Cyber Security Expert and Business Leader

Cyber Workforce

Christie Verscharen, Cyber Security Expert and Business Leader

A Straightforward, Easy-to-Navigate Guide to GDPR Member State Derogations

Data Protection Laws

A Straightforward, Easy-to-Navigate Guide to GDPR Member State Derogations

Free Remote Access Policy Template

Cyber Risk

Free Remote Access Policy Template

Be a Part of the 2018 Cyber Balance Sheet Report and Summit

Cyber Risk

Be a Part of the 2018 Cyber Balance Sheet Report and Summit

Predicting 2018's Biggest Stories in Cyber Security

Cyber Risk

Predicting 2018's Biggest Stories in Cyber Security

4 Common Mistakes Companies Make When Hiring Cyber Security Professionals

Cyber Workforce

4 Common Mistakes Companies Make When Hiring Cyber Security Professionals

Our Most-Read Blog Posts of 2017

Product and Service Updates

Our Most-Read Blog Posts of 2017

LaTonya Hall, Cyber Entrepreneur and Security Consultant

Cyber Workforce

LaTonya Hall, Cyber Entrepreneur and Security Consultant

Travel Agencies Get New PCI Compliance Deadline from IATA

Cyber Risk

Travel Agencies Get New PCI Compliance Deadline from IATA

Free Cyber Security Email Template: Physical Security of Laptops and Mobile Devices

Cyber Risk

Free Cyber Security Email Template: Physical Security of Laptops and Mobile Devices

A Free Password Policy Template for 2018

Cyber Risk

A Free Password Policy Template for 2018

Franchesca Sanabria, Privacy Guru and Business Leader

Cyber Workforce

Franchesca Sanabria, Privacy Guru and Business Leader

Postmodern ERM: Stakeholder-Centric Metrics and COSO's Vision

Enterprise Risk

Postmodern ERM: Stakeholder-Centric Metrics and COSO's Vision

The Eightfold Path for Enterprise Risk Management

Enterprise Risk

The Eightfold Path for Enterprise Risk Management

Kelly Schmitz, Cyber Security Instructor

Cyber Workforce

Kelly Schmitz, Cyber Security Instructor

The 11%: A Look at the Women Closing the Cyber Security Gender Gap

Cyber Workforce

The 11%: A Look at the Women Closing the Cyber Security Gender Gap

Free Template: Clean Desk Policy

Cyber Risk

Free Template: Clean Desk Policy

Why Aren't Passwords Dead Yet?

Cyber Risk

Why Aren't Passwords Dead Yet?

Phishing Case Studies: How Attackers are Taking their Time, and Taking your Money 

Cyber Risk

Phishing Case Studies: How Attackers are Taking their Time, and Taking your Money 

Free Template: Social Media Security Policy

Cyber Risk

Free Template: Social Media Security Policy

Continuous Auditing: Changing the Way You Think About Risk

Audit Insights

Continuous Auditing: Changing the Way You Think About Risk

How to Find Success at your Next Career Fair

Product and Service Updates

How to Find Success at your Next Career Fair

Chaos is a Ladder: How Hackers are Attempting to Get Rich by Creating Chaos at HBO

Cyber Risk

Chaos is a Ladder: How Hackers are Attempting to Get Rich by Creating Chaos at HBO

10 Months to Go: The Biggest GDPR Questions

Data Protection Laws

10 Months to Go: The Biggest GDPR Questions

Focal Point Named a TBBJ Fast 50 Company

Product and Service Updates

Focal Point Named a TBBJ Fast 50 Company

11 Things Your Company Should Be Doing Now to Protect against Attacks like NotPetya

Cyber Risk

11 Things Your Company Should Be Doing Now to Protect against Attacks like NotPetya

Crown Jewels: The Most Important Assessment You're Not Conducting

Cyber Risk

Crown Jewels: The Most Important Assessment You're Not Conducting

4 Free Cyber Security Awareness Email Templates To Use at Your Company

Cyber Risk

4 Free Cyber Security Awareness Email Templates To Use at Your Company

Measuring Security and the Financial Impact of Data Breaches

Cyber Risk

Measuring Security and the Financial Impact of Data Breaches

Will Trump's Executive Order Reshape Cyber Training?

Cyber Workforce

Will Trump's Executive Order Reshape Cyber Training?

Trump's Cybersecurity Executive Order Adds Urgency

Cyber Risk

Trump's Cybersecurity Executive Order Adds Urgency

OWASP Suggests Updates to Top 10 for 2017

Cyber Risk

OWASP Suggests Updates to Top 10 for 2017

Three Things We Learned at Cyber Shield 2017

Cyber Workforce

Three Things We Learned at Cyber Shield 2017

Focal Point Releases Malware Analysis of Android X-Agent Implant

Cyber Risk

Focal Point Releases Malware Analysis of Android X-Agent Implant

What They're Saying About the Cyber Balance Sheet Report

Cyber Risk

What They're Saying About the Cyber Balance Sheet Report

What The Board Wants CISOs to Know

Cyber Risk

What The Board Wants CISOs to Know

5 Tips for Communicating Cyber Risk to the Board

Cyber Risk

5 Tips for Communicating Cyber Risk to the Board

HIPAA Risk Analysis - More Effective Before A Breach

Data Protection Laws

HIPAA Risk Analysis - More Effective Before A Breach

The Cyber Balance Sheet Report is Here!

Cyber Risk

The Cyber Balance Sheet Report is Here!

10 Strategies for Remediating SoDs

Audit Insights

10 Strategies for Remediating SoDs

Simplifying HIPAA Compliance for Business Associates

Data Protection Laws

Simplifying HIPAA Compliance for Business Associates

Who is Focal Point?

Product and Service Updates

Who is Focal Point?

NIST Issues Guidelines on Systems Security Engineering

Cyber Risk

NIST Issues Guidelines on Systems Security Engineering

Federal Regulators Propose Heightened Cyber Security Standards for Banks

Cyber Risk

Federal Regulators Propose Heightened Cyber Security Standards for Banks

Are You Ready for Model Audit Rule in 2017?

Audit Insights

Are You Ready for Model Audit Rule in 2017?

Is the IoT Putting You at Risk?

Cyber Risk

Is the IoT Putting You at Risk?

5 Tips for a Great Internal Audit Analytics Program

Audit Insights

5 Tips for a Great Internal Audit Analytics Program

Infographic: When Fraud Goes Unchecked

Audit Insights

Infographic: When Fraud Goes Unchecked

AICPA Proposes New Criteria for Cybersecurity Risk Management

Audit Insights

AICPA Proposes New Criteria for Cybersecurity Risk Management

Focal Point Media Roundup - August 2016

Product and Service Updates

Focal Point Media Roundup - August 2016

Focal Point Media Roundup - July 2016

Product and Service Updates

Focal Point Media Roundup - July 2016

The Evolution of IDaaS

Identity

The Evolution of IDaaS

Infographic: The Magnitude of Third-Party Risk

Cyber Risk

Infographic: The Magnitude of Third-Party Risk

Cyber Strategies for Modern Adversaries

Cyber Risk

Cyber Strategies for Modern Adversaries

Insights From The PCAOB's 2015 Inspection Reports

Audit Insights

Insights From The PCAOB's 2015 Inspection Reports

2016 Data Breach Notification Trends

Privacy Risk

2016 Data Breach Notification Trends

Ask The Experts: Password Security

Cyber Risk

Ask The Experts: Password Security

Infographic: 2016 Data Privacy Trends

Privacy Risk

Infographic: 2016 Data Privacy Trends

Data Protection in Thailand: A Summary of the PDPA

HPE's Deputy CISO Discusses Cyber Workforce Development

Tips for Improving Data Privacy Conversations in the Boardroom

How to Build Obfuscated Macros for your Next Social Engineering Campaign

How to Build a Cheap Active Directory Pen Test Lab in AWS Without Any Effort

What Makes a Good Penetration Test?

A Closer Look at the AICPA’S SOC for Cybersecurity

6 Tips for Getting Started with CCPA Compliance

SOC 1, SOC 2, or SOC 2+ - Which SOC Report Is Right for Your Organization?

The MFA Vulnerability You May Be Missing

Beyond the CCPA: Nevada's New Internet Privacy Law, SB 220

Beyond the GDPR: A Look at China's National Data Protection Standard

How the CCPA Is Impacting State Data Protection Legislation in the U.S.

What Does the Brexit Extension Mean for Data Protection?

What You Need to Know about Brazil’s New Personal Data Protection Regulation Now

The GDPR in 2019: Enforcement and Penalties around the Globe

Upgrading Your Internal Controls for a Hybrid Environment

How to Use Privacy KRIs to Predict Future Risks

A New Tool for Finding Malicious JavaScript and Securely Using External Libraries

8 Areas to Include in SAP Access Control Testing

Let's Get Cracking: A Beginner's Guide to Password Analysis

5 Things to Consider before Upgrading from SAP GRC 10.x to GRC 12.0

Top Trends in Third-Party Risk Management for 2019

A CCPA Update: Preparing for Public Forums and the Look-Back Requirement

Data Privacy Day 2019: Privacy Trends to Watch in 2019

2018 in Review: A Year of Internal Penetration Testing

Prevention Is the Best Medicine: A Guide to SAP Security Health Checks

Understanding the Differences between PIAs and the GDPR's DPIAs

Adequacy Decisions, BCRs, and Whitelists: Understanding Cross-Border Data Transfers in the GDPR Era

Louisiana, Ohio, and Vermont Update Cyber Security and Privacy Laws

Three Ways Brexit Could Impact Data Protection in the UK

The 5 Most In-Demand Cyber Security Jobs for 2019

New Guidance: Protecting Data in the Age of Artificial Intelligence

What Is the Future of the EU-U.S. Privacy Shield?

New Data Shows Cyber Security Talent Shortage Growing

Canada Updates PIPEDA Breach Notification Requirements

Record-Setting Fines Push HIPAA Into the Spotlight

Get Ready: Germany’s DPAs Are Starting Their GDPR Audits

When Does HIPAA Apply to Health Apps?

The Hidden Benefits of Vendor Risk Management

Understanding PHI Disclosures under the 21st Century Cures Act

Dr. Lori DeLooze, Cyber Security Pioneer and Defensive Security Expert

6 Key Changes in the New California Consumer Privacy Act Amendments

Are Your Vendors GDPR Compliant?

How to Spot Hidden Cyber Security Talent at your Company

Why the EU-Japan Data Transfer Agreement Is So Significant

When is a DPIA Required under the GDPR?

Regulation Comparison: The California Consumer Privacy Act and the GDPR

How to Use Vendor Profiles to Address Third-Party Risk

A Look at the New California Consumer Privacy Act of 2018

What You Need to Know about Colorado’s New Data Protection Law

Quick FAQ: Responding to Data Subject Requests under the GDPR

4 Hurdles Standing between You and Effective Vendor Risk Management

How Leveraging ISO 27000 and NIST Frameworks Can Help You Align with the GDPR

A Roundup of Our Most Popular GDPR Resources and Guides

What is Integrated Risk Management?

Data Privacy in Paradise: A Look at the Privacy Regulations of Bermuda and the British Virgin Islands

Understanding the DPO and EU Representative Roles under the GDPR

A PCI DSS Update Is Coming: What You Need to Know about PCI DSS v3.2.1

Beyond the GDPR: What You Should Know about Japan’s Act on the Protection of Personal Information

Understanding the 4 Phases of the NYDFS Cybersecurity Regulation (23 NYCRR 500)

What’s Inside South Dakota and Alabama’s New Data Breach Notification Laws?

The ePrivacy Regulation and the GDPR: What You Need to Know Now

Beyond the GDPR: What You Should Know about the Philippines’ Data Privacy Act of 2012

The Keys to a Seamless FASB ASC 842 Implementation

What Are the Reasons Behind the Cyber Security Talent Shortage?

Does Your Marketing Strategy Align with the GDPR?

A Step-by-Step Checklist for Meeting GDPR Consent Requirements

One RSA Session You Should Definitely Reserve a Seat For

A Quick Guide to the Biggest Updates in the SEC's Guidance on Cyber Security Disclosures

How Big Is the Cyber Security Talent Shortage?

9 Examples of Lawful Basis for Processing under the GDPR

Christie Verscharen, Cyber Security Expert and Business Leader

A Straightforward, Easy-to-Navigate Guide to GDPR Member State Derogations

Free Remote Access Policy Template

Be a Part of the 2018 Cyber Balance Sheet Report and Summit

Predicting 2018's Biggest Stories in Cyber Security

4 Common Mistakes Companies Make When Hiring Cyber Security Professionals

Our Most-Read Blog Posts of 2017

LaTonya Hall, Cyber Entrepreneur and Security Consultant

Travel Agencies Get New PCI Compliance Deadline from IATA

Free Cyber Security Email Template: Physical Security of Laptops and Mobile Devices

A Free Password Policy Template for 2018

Franchesca Sanabria, Privacy Guru and Business Leader

Postmodern ERM: Stakeholder-Centric Metrics and COSO's Vision

The Eightfold Path for Enterprise Risk Management

Kelly Schmitz, Cyber Security Instructor

The 11%: A Look at the Women Closing the Cyber Security Gender Gap

Free Template: Clean Desk Policy

Why Aren't Passwords Dead Yet?

Phishing Case Studies: How Attackers are Taking their Time, and Taking your Money 

Free Template: Social Media Security Policy

Continuous Auditing: Changing the Way You Think About Risk

How to Find Success at your Next Career Fair

Chaos is a Ladder: How Hackers are Attempting to Get Rich by Creating Chaos at HBO

10 Months to Go: The Biggest GDPR Questions

Focal Point Named a TBBJ Fast 50 Company

11 Things Your Company Should Be Doing Now to Protect against Attacks like NotPetya

Crown Jewels: The Most Important Assessment You're Not Conducting

4 Free Cyber Security Awareness Email Templates To Use at Your Company

Measuring Security and the Financial Impact of Data Breaches

Will Trump's Executive Order Reshape Cyber Training?

Trump's Cybersecurity Executive Order Adds Urgency

OWASP Suggests Updates to Top 10 for 2017

Three Things We Learned at Cyber Shield 2017

Focal Point Releases Malware Analysis of Android X-Agent Implant

What They're Saying About the Cyber Balance Sheet Report

What The Board Wants CISOs to Know

5 Tips for Communicating Cyber Risk to the Board

HIPAA Risk Analysis - More Effective Before A Breach

The Cyber Balance Sheet Report is Here!

10 Strategies for Remediating SoDs

Simplifying HIPAA Compliance for Business Associates

Who is Focal Point?

NIST Issues Guidelines on Systems Security Engineering

Federal Regulators Propose Heightened Cyber Security Standards for Banks

Are You Ready for Model Audit Rule in 2017?

Is the IoT Putting You at Risk?

5 Tips for a Great Internal Audit Analytics Program

Infographic: When Fraud Goes Unchecked

AICPA Proposes New Criteria for Cybersecurity Risk Management

Focal Point Media Roundup - August 2016

Focal Point Media Roundup - July 2016

The Evolution of IDaaS

Infographic: The Magnitude of Third-Party Risk

Cyber Strategies for Modern Adversaries

Insights From The PCAOB's 2015 Inspection Reports

2016 Data Breach Notification Trends

Ask The Experts: Password Security

Infographic: 2016 Data Privacy Trends