Implementing a Simple and Secure SDLC
Use a seamless and safe process to develop, deploy, and maintain any modern software application. The ability to create a software application has never been easier. Anyone can learn how [...]
Use a seamless and safe process to develop, deploy, and maintain any modern software application. The ability to create a software application has never been easier. Anyone can learn how [...]
Check out our webinar from Christian Hyatt and Sawyer Miller where they discuss everything you need to know to prepare for your first ISO 27001 Certification. https://www.youtube.com/watch?v=AJbK3jH677k&feature=youtu.be Listen to [...]
Answering some of the most commonly asked questions around ISO 27001 implementation. At risk3sixty, we have helped many clients implement ISO 27001. Through this work, we have pinpointed a few [...]
Check out our webinar from Christian Hyatt and Shane Peden where they discuss roadmaps and business cases for security, privacy, and compliance for healthcare technology companies. https://youtu.be/z4aFZnPWGRU
An interview with our BCP expert, Glenn Chamberlain To get Business Continuity Awareness Week kicked off, we wanted to have a quick sit-down with a proficient business continuity professional, Glenn [...]
At the end of March, Shane Peden, Director of Cyber Risk and CISO Advisory at risk3sixty, spoke at BSides Atlanta 2020 about strategies for implementing "defense-in-depth" within Amazon Web Services, [...]
Over the last few days, we have had dozens of clients ask our team for insight into how other clients are reacting to the recent Coronavirus (COVID-19) pandemic. As a [...]
A quick explanation of one of the most influential and misconfigured computing utilities. A classic view into some of the tools use by pentesters at risk3sixty. You’re a [...]
A few things to consider when choosing a consulting firm partner. At risk3sixty, we interact with a lot of prospective customers who want us as a security consulting partner. Some [...]
How to leverage information security policies into leveling up your security program. People often regard information security policy as a "check-the-box" compliance initiative. Many organizations will copy a policy [...]