Travisliska

This user doesn't have a profile picture yet.

Registered since July 2nd, 2020

Has a total of 17 bookmarks.

Showing top Tags within 14 bookmarks

cybersecurity   nesa   nesacompliance   informationsecurity   pcidss   bcp   pentesting   business   pciaudit   UAE   ccpacertification   nesaaudit   ecommerce   IAS Standards   vapt   BankingIndustry   linux   vistainfosec   hipaacompliance   SOC1   compliance   pcidsscompliance   pcicompliance   Security controls   soc2   Banking   ccpa   businesscontinuity   businessrisk   healthcareindustry   SOC1reporting   penetrationtesting   scp   security   soc2audit   Cooperativebank   ccpacompliance   bcpplan   datasecurity   vulnerabilityassessment   RBI   penetration testing   databreach   businesscontinuityplan   hipaa   owasp  


Tag selected: cybersecurity.

Clear all

Showing 14 results.

Looking up cybersecurity tag. Showing 14 results. Clear

Everything you need to know about SOC1 Reporting

https://www.vistainfosec.com/blog/everything-you-need-to-know-about-soc1-reporting/

Saved by Travisliska on September 28th, 2020.

we have covered in detail the SOC1 Attestation and Reports, highlighting its purpose and use to your organization.

SOC1 SOC1reporting cybersecurity


Infovore CTF

https://www.vistainfosec.com/blog/infovore-ctf/

Saved by Travisliska on September 15th, 2020.

We start with another boot2root machine from Vulnhub. This machine is called Infovore and is misconfigured by the administrators a very known vulnerability that appears in OWASP Top 10. As per the description of the machine, it is supposedly configured by lazy administrators and our job is to exploit innocent-looking PHP functions while capturing all 4 flags on the machine. We start with powering on the virtual machine.

owasp pentesting cybersecurity


Bridge letter and its significance in a SOC Report

https://www.vistainfosec.com/blog/bridge-letter-and-its-significance-in-a-soc-report/

Saved by Travisliska on September 10th, 2020.

For your better understanding of a Bridge Letter, we have today briefly discussed the relevance and significance of a bridge letter in a SOC1 and SOC2 Report. This post will cover most of the common questions users have about the bridge letter related to SOC reports (both SOC 1 and SOC 2).

soc2 cybersecurity soc2audit informationsecurity


Difference between Vulnerability Assessment & Penetration Testing

https://www.vistainfosec.com/blog/difference-between-vulnerability-assessment-penetration-testing/

Saved by Travisliska on September 2nd, 2020.

In this post, we intend to clear the common misconception and highlight the differences between Vulnerability Assessment and Penetration Testing. The article details when and where each of the security assessment processes is used and applicable to organizations.

pentesting penetrationtesting vulnerabilityassessment vapt cybersecurity


CCPA Compliance & Certification Services

https://www.vistainfosec.com/ccpa-certification.php

Saved by Travisliska on August 21st, 2020.

The California Consumer Privacy Act (CCPA) is a privacy law that regulates how businesses all over the world are allowed to handle the personal information (PI) of California residents

ccpa ccpacompliance ccpacertification cybersecurity


SCP Privilege Escalation

https://www.vistainfosec.com/blog/scp-privilege-escalation/

Saved by Travisliska on August 20th, 2020.

SCP is a built-in command in Linux which is used to copy file(s) between servers in a secure way.

scp cybersecurity penetration testing linux


PCI DSS Compliance For Remote Access During COVID-19 Pandemic

https://www.vistainfosec.com/blog/pci-dss-compliance-for-remote-access-during-covid-19-pandemic/

Saved by Travisliska on August 17th, 2020.

How does the PCI Data Security Standard (PCI DSS) support secure remote working?

pcidss pcidsscompliance pciaudit cybersecurity informationsecurity


A Guide to NESA’s Audit & Compliance Process

https://www.vistainfosec.com/blog/a-guide-to-nesas-audit-compliance-process/

Saved by Travisliska on August 12th, 2020.

Let us today understand the Audit and Compliance Process that NESA has drawn out in its guidelines introduced.

nesa nesacompliance nesaaudit uae cybersecurity informationsecurity


Importance of Business Continuity Plan

https://www.vistainfosec.com/blog/importance-of-business-continuity-plan/

Saved by Travisliska on July 27th, 2020.

Business Continuity Plan is all about having in place strategies and a test plan that can help cope with the situation with the least or minimum impact.

businesscontinuityplan bcp businessrisk cybersecurity informationsecurity


PCI DSS 4.0 Updates

https://www.vistainfosec.com/blog/pci-dss-4-0-updates/

Saved by Travisliska on July 23rd, 2020.

PCI-DSS 4.0 is the latest version of the Payment Card Industry Data Security Standard.

pcidss pcicompliance pciaudit cybersecurity


A brief introduction to HIPAA Compliance

https://www.vistainfosec.com/blog/a-brief-introduction-to-hipaa-compliance/

Saved by Travisliska on July 21st, 2020.

Protected health information (PHI) is data or information about a patient or client availing healthcare services.

hipaa hipaacompliance healthcareindustry cybersecurity datasecurity




NESA Compliance Service

https://www.vistainfosec.com/nesa-compliance.php

Saved by Travisliska on July 6th, 2020.

NESA Compliance Service

nesa compliance nesacompliance cybersecurity


No further bookmarks found.