Rivial’s Cybersecurity blog

The Savvy CISO

Cybersecurity management insights, tips, and trends for security leaders, CISOs, vCISOs, and MSSPs who want to work smarter, not harder.

4 min read

How Do Hackers Hack Into Your Website?

Here are the key takeaways from this blog: Hackers exploit both people and technology — from social engineering to software vulnerabilities, understanding their methods is the first step to defending your website. No site is too small to be a target...

Read More

3 min read

Differences Between ISO 27001 vs 27002

Within the world of information security, there are standards for the way data is handled. Much of this takes place within a business framework. The...

Read More

3 min read

What are the Benefits of Network Segmentation?

What is network segmentation? The most simple definition is that it’s the process of breaking large networks into multiple segments that are isolated...

Read More

3 min read

California Consumer Privacy Act (CCPA) Compliance Guide

SixFifty recommends starting with a personal CCPA assessment within your company. Look at the data you’re collecting, who you are collecting it from,...

Read More

3 min read

What is Data Tokenization in Payments?

Data tokenization in payment processing is the process of replacing a credit card/debit card, bank account number, or any other financial-related...

Read More

4 min read

How to Tell if an Email is Fake or Legitimate

Here are the key takeaways from this blog: Phishing emails are getting harder to spot — attackers now use convincing tactics like spoofed domains,...

Read More
Third-Party Vendor Risk Management for Banks & Credit Unions - Rivial

4 min read

Third-Party Vendor Risk Management for Banks & Credit Unions

Key takeaways: Standardization is essential: Implementing a consistent, repeatable process—including documentation, performance grading, and...

Read More

3 min read

5 Steps of the Risk Management Process [2020 Update]

On any given day, your company faces risks in its day-to-day operations. Case in point, at any moment your business’s network could be hacked, and...

Read More

2 min read

What is PCI DSS Level 1 Compliance?

Payment Card Industry Data Security Standard, also known as PCI DSS, is the set of requirements established by an independent council that ensures...

Read More

3 min read

Penetration Testing vs. Vulnerability Scanning

When searching for information on network security testing, keeping all of the jargon straight can get a little overwhelming. For example,...

Read More