HIPAA Security Rule for dummies

HIPAA (Health Insurance Portability and Accountability Act) is a 1996 federal law that seeks to protect the medical information of patients. To achieve this, it lays down certain compliance requirements for covered entities. In the context of HIPAA, covered entities are organizations on which HIPAA is applicable. Under Title II of this act, the US … Continued

Penetration Testing for ISO 27001 Control A.12.6.1

Out of all the security standards that have been prescribed by various bodies and organizations so far, ISO 27001:2013 has been the most popular one – without any doubt. Containing ten clauses and 114 controls, this standard has also served as a stepping stone for many organizations to improvise their information security policies and procedures. In this … Continued

Penetration Testing and Vulnerability Scanning for PCI DSS

Irrespective of the industry, penetration testing and vulnerability scanning exercises help businesses a great deal when it comes to the security of their technical infrastructure. For businesses processing sensitive data such as credit card data, such practices have more relevance than ever. The foundation for this article was laid by one of our previous articles where … Continued

Network Penetration Testing Fundamentals

In the ever-evolving cyberspace when the hackers are extensively going after any organization irrespective of its size, it is important for an organization to ensure that it puts into best efforts to ensure the security of its technical infrastructure. Penetration testing rightly helps an organization by finding and identifying vulnerabilities, assessing the damage, and mitigating them before they are … Continued