Home / Blog / Uncategorized
Receive articles and resources from the information risk management experts at FoxPointe.
This article was written by Christopher Salone, CISA, CCSFP, MBA As another year passes, more cybersecurity laws and regulations for financial institutions are proposed and or updated. Let’s recap the last twelve months and look at some of the most impactful cyber regulatory updates that, whether coming soon or are...
This article was written by Jessica Ramirez, Security Consultant at FoxPointe Solutions. In 2018, one of the most well-known side-channel attacks was discovered. The Spectre and Meltdown attack was noteworthy because of how the exploitation affected almost every modern computer processor using software alone, making it difficult to detect. There...
This article was written by Christopher Salone, CISA, CCSFP, MBA After years of presenting to Audit Committees, you develop effective ways of communicating not only the results of your IT Audits, but also the health and state of the Organization as a whole. Frequently, I find that at the end...
This article was written by James Normand, Security Consultant at FoxPointe Solutions With the rise of ChatGPT, deepfakes, and AI-generated art, many people are being exposed to the black box that is advanced computer science. While the inner workings of AI algorithms are known to their developers, the tools that...
SOC2 Fireside Chat with Charlie Wood of FoxPointe Solutions, a division of The Bonadio Group, Reg Harnish of OrbitalFire and Matt Farry of RealCISCO.
...By: Emily Mosack, Security Consultant at FoxPointe Solutions Must Knows for Tax Season The end of the year and start of the new year mean tax season is approaching quickly. Tax season is one of the most active times for scammers. Thousands of people have become victims of tax scams...
This article was written by Ryan Bigelow, Director at FoxPointe Solutions Background In the class action lawsuit Martin v. Safeway Inc., the plaintiff (Martin) alleged that Safeway printed receipts for credit or debit card transactions at its gas stations displaying first six (6) and last four (4) digits of payment...
This article was written by Jessica Ramirez, Security Consultant at FoxPointe Solutions. In this day and age, the importance of having proper security controls in place is critical in order to reduce or mitigate the risk of cyberattacks. Due to the recent global pandemic, security breaches have become more apparent....
Cybersecurity Careers So, what do cybersecurity professionals do? According to Indeed, “working in cybersecurity means protecting company networks, data and various systems from digital attack.” Positions within cybersecurity can range from IT roles such as support specialist and infrastructure specialist, to more consulting roles such as analyst and consultant. As...
By Brandon Agostinelli, CISA, CCSFP; Christopher Salone, MBA, CISA, CCSFP; and Carl Cadregari, CISA, CTPRP What is the Zero Trust Architecture? As our world changes and evolves, so does the way organizations operate. Business models change, and infrastructures and networks grow and become more complex. In the past, perimeter-based architecture...