Cybersecurity and NAICS Codes

Cybersecurity and NAICS Codes

Overview The cybersecurity industry is an aggregation of products and services to protect computer networks from data confidentiality, integrity and availability. It’s vital to the health and continued functioning of the Internet and all connected organizations....
Application Lifecycle Management in High Security Systems

Application Lifecycle Management in High Security Systems

Overview   Security of software products during both development and operations is vital and can effects national security, therefore the security control baseline selected will be ‘high-impact” criteria in NIST 800-53 based on the criteria in NIST 800-60 stating...
Identity Governance & Administration (IGA) Software

Identity Governance & Administration (IGA) Software

    Introduction   One of the foundational components of the security architecture is the management of identity credentials and authorization to interact with data. Currently the method is a manual paper-based system routed between the HR department...
Business Need for Investments in Cybersecurity

Business Need for Investments in Cybersecurity

Introduction   In February 2017, Memorial Healthcare System (MHS) in southern Florida was assessed a $5.5 million penalty by the US Office of Civil Rights for HIPAA (Health Insurance Portability and Accountability Act) violations. The penalty was for “failure to...
Legal Requirements of Information Security

Legal Requirements of Information Security

Businesses must fulfill their legal duty to protect the confidentiality and integrity of data. Most industrialized nations and US states have legal requirements for data security(Brotby, 2009, p. 14). Failure to comply range from severe financial penalties to prison...