855.519.7328
Image Post

CipherLoc Unprecedented Security for Data & Communications

CipherLoc Teams with Praetorian Secure to Bring Unprecedented Security to Data and Communications October 11, 2016 08:00 AM Eastern Daylight Time AUSTIN, Texas--(BUSINESS WIRE)--CipherLoc Corporation (OTCQB:CLOK), the data security company that enables an ironclad layer of data protection, has partnered with Praetorian Secure, LLC, a provider of security technology and solutions for organizations like the U.S. Army, United Healthcare and Xerox. Praetorian Secure is now a full systems integrator for CipherLoc’s solution

Image Post

Mobile App Development Policies

Mobile App Development is on the Rise Mobile applications, often referred to as apps, provide much needed convenience and functionality for today's workforce. Developers across every industry vertical have created mobile applications for various uses and business requirement, which is contributing to the proliferation of modern mobile devices. However, the ease in which these applications are developed can potentially permit attack vectors for cyber criminals. Nearly every banking institution has developed apps for customers

Image Post

Secure Coding

Software developers and all other relevant personnel involved in the development of software for organizations are required to undergo annual training in secure coding techniques for the software platforms(s) with which they work. In many cases, these same developers and organizations are also required to submit Secure Code Training checklists on an annual basis as evidence that they are meeting the secure coding technique requirements. In addition to many compliance requirements

Image Post

State of the Union Sounded Like State of Security

SOTU State of Security (SOTU SOS) While many pundits and political experts from the various news stations came across my television to speculate on the major topics our Commander-In-Chief would touch on during his State of the Union (SOTU) address, none thought he would focus as much attention as he did on the subject of Cybersecurity. Understanding the obvious technological advancements we have made since President(s) Reagan, Bush Sr., and Bill Clinton

Image Post

NIST Security Recommendations for Cloud

NIST Security Recommendations for Cloud For the better part of two years now cloud computing has drawn significant spotlight for ease of use, lower cost, and overall reduction in resources required by the companies that utilize these services. However, a major concern from the beginning has been how security is applied within the cloud environment and ultimately the capability to meet compliance requirements. Federal agencies in early 2014 were tasked with migrating

Image Post

Application Risk Assessment 7-Steps

Application Risks Application software development is sweeping our industry at an alarming rate. From organizations adopting various apps for iPhone, iPad, and Android platforms, to full-on internally developed applications to support their business and customer requirements. While the need for these applications increase, we are finding that the security technologies allowing for a solid Software Development Life-cycle (SDLC) are limited. Over the years, we have seen a number of companies that have

Image Post

Anti-Spam Law Forces Change at Microsoft

From Canada with Love: Canadian Anti-Spam Law Forces Change at Microsoft A great many of us in the security industry have come to expect and rely on the monthly email messages from our friends at the Microsoft Corporation to provide us with helpful information on the various applications to be patched on the next “Patch Tuesday”. According to Microsoft, it appears that this is coming to an end, at least temporarily. As

Image Post

5 Cybersecurity Mistakes to Avoid

As most of us know, being responsible for cybersecurity and how it is percieved within an organization can be a rather thankless task. Very seldom is our job function(s) even noticed --- unless of course our job was not done properly. With the onslaught of virtualization, mobile computing, and cloud technologies the roles of security practitioners in the workplace have not subsided, but actually become more complicated. For example, many key business

Image Post

Finding a Balance 3 Core Goals of IT Security?

We live in a world where everything seems to revolve around high-speed communication and the technology platforms that provide it. The business world is no different, in fact the very nature of conducting business these days is dependent upon how fast something can be implemented and how quickly can stake-holders access important data. It is with this in mind that I pose a very relevant (and often forgotten) question: Which is

Image Post

6 Commonly Believed Myths About PCI DSS

As a PCI QSA, and having maintained security credentials allowing me to perform audits for various IT regulatory compliance initiatives, I have found myself engaged in multiple conversations with organizations who are buying into the commonly believed myths about PCI DSS compliance. PCI DSS is certainly no exception to the rule when it comes to regulatory compliance standards being misunderstood.  While (in my opinion) the PCI Security Standards Council (SSC) does pretty