Rivial’s Cybersecurity blog

The Savvy CISO

Cybersecurity management insights, tips, and trends for security leaders, CISOs, vCISOs, and MSSPs who want to work smarter, not harder.

3 min read

PCI Data Security Compliance Standards for 2022

Payment Card Industry or PCI Compliance is critical for financial institutions and other organizations that store, process, and/or transmit credit card information. The Payment Card Industry Security Standards Council (PCI SSC) has released a set of...

Read More

3 min read

Risk Analysis vs Risk Assessment

"Assess" and "analyze" mean nearly the same thing. Both terms refer to the process of gaining information and drawing conclusions from it, usually...

Read More

3 min read

Types of Penetration Testing for 2022

Penetration Testing, also referred to as pen tests, are used by security and IT professionals to assess the security of a hardware or software system...

Read More

2 min read

Data Privacy vs Data Security

Can you tell the difference between data privacy and data security? If you don’t consider yourself cyber-savvy, there is a strong possibility you...

Read More

4 min read

Top 7 HIPAA Violation Examples

Recently, we shared a post about HIPAA Compliance. In it, we explained the importance of protecting medical records and data related to the patients...

Read More

3 min read

Why FinTechs Need IT Risk Assessments & Compliance

Financial technology companies, more commonly referred to as FinTechs, face many threats from a wide variety of sources. If you understand the...

Read More

3 min read

How to Pass a Compliance Audit

In all businesses, no matter the industry, compliance audits are essential to ensuring companies are acting in accordance with the regulations set...

Read More

3 min read

How to Fix PCI Compliance Issues

Payment card industry (PCI) compliance requires a lot of dedication from a business to ensure its security of cardholder data is top-notch. Having...

Read More

3 min read

How to Create a Cybersecurity Program

The best time to decide how to create a cybersecurity program is before an incident occurs. With security being top of mind after the record-breaking...

Read More

3 min read

How Does a Wireless Access Point Work in a Network?

Is your WiFi signal weak or unreliable? Few things are as frustrating or a bigger hindrance to your productivity than online connection problems. A...

Read More