Blog

BlogEngine.NET Directory Traversal + Remote Code execution

A remote code execution (RCE) vulnerability, CVE-2019-10719, was discovered in BlogEngine 3.3.7 and earlier.

What is HITRUST Compliance?

What is HITRUST? HITRUST stands for the Health Information Trust Alliance. It was founded in 2007 and uses the “HITRUST approach” to help organizations from all sectors–but especially healthcare–effectively manage data, information risk, and compliance.

Zyxel Devices Vulnerable to Cross-Site Scripting on Login page

A reflected Cross Scripting vulnerability, CVE-2019-9955, was identified on several Zyxel devices, specifically on pages that use the mp_idx parameter.

SecurityMetrics 2019 PCI Compliance Guide

Compliance with any mandate takes time and planning. But, thousands of customers and readers use PCI Compliance Guide to make the PCI compliance process faster and simpler, as well as better maintain compliance.

What is Vulnerability Scanning?

What is Vulnerability Scanning? Vulnerability scanners are computer programs that search systems for weaknesses.

Data Breach Statistics from 2018 and Predictions for 2019

Data Breach Statistics from 2018 and Predictions for 2019. How did our predictions from 2018 turn out and what you can do in 2019 to avoid a data breach.

What is a Managed Firewall and Do You Need One?

What is a Managed Firewall and Do You Need One?

Guide to HIPAA Compliance Simplifies Data Security and Privacy

We created our Guide to HIPAA compliance to help you close gaps in security and compliance, ultimately helping you avoid a data breach.

5 Tips to Implement Security Awareness at Your Company

Whether you’re a CIO, the head of IT, or in a non-security-related position, if your data security practices are unclear, your company is at a greater risk to a data breach.

GDPR Explained: FAQs and Best Practices

The May 25th, 2018 deadline for GDPR has come and gone. So what is the state of GDPR compliance now?

Close Security Gaps in 2019: 5 Blog Topics to Help You Avoid Data Breach

We’ve rounded up some of the most helpful topics from our blog to help set you on the right course for 2019. Prepare now, so you’ll have less hassle later.

SecurityMetrics' Top Blogs of 2018

These top SecurityMetrics blog posts help you understand and implement some of the most foundational data protection principles. Our goal it to help you close gaps in security and avoid a data breach in 2019.

What is Network Security?

Network security consists of the policies, procedures, programs, hardware, software, and people you use to protect your corporate network.

New (And Old) Apache Struts Flaw: CVE-2016-1000031

Apache Struts developers released another security announcement on November 5, 2018

The Importance of Cybersecurity: SecurityMetrics' Free Academy

The importance of cybersecurity: SecurityMetrics Academy is a free educational course designed for anyone who wants to learn about data security.

Securing Mobile Devices with Mobile Encryption

How do you secure data on mobile devices? Physical security and mobile device policies are good at protecting the device itself, but another way to protect the data on the device is mobile encryption.

How to Manage a Healthcare Data Breach

Data breaches can be devastating. Here are 5 steps that will help you manage a healthcare data breach.

How Much does GDPR Compliance Cost?

How much does GDPR compliance cost?

Small Business Cybersecurity Tools

We have compiled these small business cybersecurity tools to help you maintain PCI compliance.

What is the HIPAA Privacy Rule?

The HIPAA Privacy Rule is crucial for protecting PHI and ensuring patient privacy. Learn about HIPAA PHI compliance with our free guide.

Apache Struts Vulnerability: What You Should Do

The Apache Struts project has just released a security bulletin about a new critical vulnerability in the Apache Struts web application framework. Here's how to protect yourself.

Cloud Security: What Businesses Need to Know

In this post, we’ll review an incident from last year to demonstrate the breadth of controls that should be established, as well as the difficult position in which any security event can place you.

PCI vs. GDPR: What’s the Difference?

GDPR applies to any organization that processes or holds the personal data of persons residing in the European Union. PCI applies to organizations that handle credit cards from the major card brands.

Network Diagrams: Key to Compliance and Security

If you were to ask network architects and engineers about their favorite part of the job, I doubt any of them will respond with “creating and maintaining network diagrams.”