Rivial’s Cybersecurity blog

The Savvy CISO

Cybersecurity management insights, tips, and trends for security leaders, CISOs, vCISOs, and MSSPs who want to work smarter, not harder.

3 min read

Types of Penetration Testing for 2022

Penetration Testing, also referred to as pen tests, are used by security and IT professionals to assess the security of a hardware or software system to see if there are weaknesses or vulnerabilities.

Read More

2 min read

Data Privacy vs Data Security

Can you tell the difference between data privacy and data security? If you don’t consider yourself cyber-savvy, there is a strong possibility you...

Read More

4 min read

Top 7 HIPAA Violation Examples

Recently, we shared a post about HIPAA Compliance. In it, we explained the importance of protecting medical records and data related to the patients...

Read More
Passing Compliance Audits With Ease

4 min read

How to Pass a Compliance Audit

Here are 4 key takeaways you can feature at the top of your compliance audit blog: Audit Readiness Starts with Preparation: Regular self-assessments,...

Read More

3 min read

Why FinTechs Need IT Risk Assessments & Compliance

Financial technology companies, more commonly referred to as FinTechs, face many threats from a wide variety of sources. If you understand the...

Read More

4 min read

How to Fix PCI Compliance Issues

Here are the key takeaways from this blog: PCI compliance is more than checking boxes—missteps like unclear scope, outdated processes, or incorrect...

Read More

3 min read

How Does a Wireless Access Point Work in a Network?

Here are the key takeaways from this blog: Struggling with Weak WiFi? Adding wireless access points can eliminate dead zones and boost signal...

Read More

3 min read

What is HIPAA compliance?

During the 1990s, the medical world was undergoing a transition. For decades, hospitals and medical offices had kept physical copies of patient...

Read More

2 min read

What is Network Penetration in Cybersecurity?

The confetti just recently fell ringing in 2021, and unfortunately cybersecurity and data breaches are already top of mind. Even organizations that...

Read More

6 min read

How to Test Your Firewall Security & Rules

Here are the key takeaways from this blog: Firewalls remain a critical first line of defense—but without regular testing, misconfigurations and...

Read More