Management, compliance & auditing
Management, compliance & auditing
Congratulations on securing an interview for the security architect role! Security architects design and configure systems to protect the infrastructure and
June 27, 2025
Simon Puleo
Management, compliance & auditing
Uncover the 10 crucial cybersecurity steps to ensure maximum digital safety. Be proactive in your security with this comprehensive guide.
July 23, 2024
Stephan Miller
Management, compliance & auditing
AI is constantly evolving as a threat and as a solution to protect your organization. Are you accounting for it?
November 18, 2023
Ellen Pincus
Management, compliance & auditing
Learn a quick overview of the federal government’s privacy and cybersecurity laws.
January 30, 2023
John Bandler
Management, compliance & auditing
Learn how federal and state privacy laws intersect with cybersecurity and how to comply without being overwhelmed.
September 20, 2022
John Bandler
Management, compliance & auditing
Find out why your company should look into how payment card industry data security standards affect your business.
September 14, 2022
Ken Chikwanha
Management, compliance & auditing
The Payment Card Industry Data Security Standard, or PCI DSS, is a set of measures designed to help protect customers’ data and reduce credit card fraud.
July 15, 2022
Ken Chikwanha
Management, compliance & auditing
Take these steps to keep your infosec team from burning out at work.
June 9, 2022
Christine McKenzie
Management, compliance & auditing
Information security professionals benefit when they learn foundational principles of United States law.
May 31, 2022
John Bandler
Management, compliance & auditing
Learn about data protection practices that will help you keep your data safe.
April 22, 2022
Ralph O'BrienLearn Web Server Protection
Build the skills you need to design, evaluate and monitor the security of a web server or web application. What you'll learn:- Hardening
- Implementing controls
- Using command-line utilities
- Maintaining a WAF
- Deploying active defense
- And more
In this series
- The top security architect interview questions you need to know
- Top 10 cybersecurity best practices: Secure your organization’s data
- Is AI cybersecurity in your policies?
- Federal privacy and cybersecurity enforcement — an overview
- U.S. privacy and cybersecurity laws — an overview
- Common misperceptions about PCI DSS: Let’s dispel a few myths
- How PCI DSS acts as an (informal) insurance policy
- Keeping your team fresh: How to prevent employee burnout
- How foundations of U.S. law apply to information security
- Data protection Pandora's Box: Get privacy right the first time, or else
- Privacy dos and don'ts: Privacy policies and the right to transparency
- Starr McFarland talks privacy: 5 things to know about the new, online IAPP CIPT learning path
- Data protection vs. data privacy: What’s the difference?
- NIST 800-171: 6 things you need to know about this new learning path
- Working as a data privacy consultant: Cleaning up other people’s mess
- 6 ways that U.S. and EU data privacy laws differ
- Navigating local data privacy standards in a global world
- Building your FedRAMP certification and compliance team
- SOC 3 compliance: Everything your organization needs to know
- SOC 2 compliance: Everything your organization needs to know
- SOC 1 compliance: Everything your organization needs to know
- Overview: Understanding SOC compliance: SOC 1 vs. SOC 2 vs. SOC 3
- How to comply with FCPA regulation – 5 Tips
- ISO 27001 framework: What it is and how to comply
- Why data classification is important for security
- Threat Modeling 101: Getting started with application security threat modeling [2021 update]
- VLAN network segmentation and security- chapter five [updated 2021]
- CCPA vs CalOPPA: Which one applies to you and how to ensure data security compliance
- IT auditing and controls – planning the IT audit [updated 2021]
- Finding security defects early in the SDLC with STRIDE threat modeling [updated 2021]
- Cyber threat analysis [updated 2021]
- Rapid threat model prototyping: Introduction and overview
- Commercial off-the-shelf IoT system solutions: A risk assessment
- A school district's guide for Education Law §2-d compliance
- IT auditing and controls: A look at application controls [updated 2021]
- 6 key elements of a threat model
- Top threat modeling frameworks: STRIDE, OWASP Top 10, MITRE ATT&CK framework and more
- Average IT manager salary in 2021
- Security vs. usability: Pros and cons of risk-based authentication
- Threat modeling: Technical walkthrough and tutorial
- Comparing endpoint security: EPP vs. EDR vs. XDR
- Role and purpose of threat modeling in software development
- 5 changes the CPRA makes to the CCPA that you need to know
- 6 benefits of cyber threat modeling
- What is threat modeling?
- First Safe Harbor, then Privacy Shield: What EU-US data-sharing agreement is next?
- How to make cybersecurity budget cuts without sacrificing security
- How to mitigate security risk in international business environments
- Security theatrics or strategy? Optimizing security budget efficiency and effectiveness
- NY SHIELD Act: Security awareness and training requirements for New York businesses
Get free resources in your inbox!
Sign up for our newsletter and get free cybersecurity resources in your inbox every week. Prepare for your next cert, learn new skills, increase your salary and more!