Rivial’s Cybersecurity blog

The Savvy CISO

Cybersecurity management insights, tips, and trends for security leaders, CISOs, vCISOs, and MSSPs who want to work smarter, not harder.

3 min read

What is HIPAA compliance?

During the 1990s, the medical world was undergoing a transition. For decades, hospitals and medical offices had kept physical copies of patient records in file folders. With the growth of the internet, these facilities saw the benefits of sending...

Read More

2 min read

What is Network Penetration in Cybersecurity?

The confetti just recently fell ringing in 2021, and unfortunately cybersecurity and data breaches are already top of mind. Even organizations that...

Read More

5 min read

How to Test Your Firewall Security & Rules

According to recent security statistics, cybercrime is more diverse and prevalent today than ever before. A digitized business world means more...

Read More

4 min read

How Do Hackers Hack Into Your Website?

One of the biggest fears that website owners have is getting hacked. The question most people want to know is how do hackers hack a website? There...

Read More

2 min read

NIST Special Publication (SP) 800 Series

Financial data is continuously at risk of theft from external cyber threats. These threats have the potential to cost financial institutions like...

Read More

3 min read

Differences Between ISO 27001 vs 27002

Within the world of information security, there are standards for the way data is handled. Much of this takes place within a business framework. The...

Read More

3 min read

What are the Benefits of Network Segmentation?

What is network segmentation? The most simple definition is that it’s the process of breaking large networks into multiple segments that are isolated...

Read More

3 min read

California Consumer Privacy Act (CCPA) Compliance Guide

SixFifty recommends starting with a personal CCPA assessment within your company. Look at the data you’re collecting, who you are collecting it from,...

Read More

3 min read

What is Data Tokenization in Payments?

Data tokenization in payment processing is the process of replacing a credit card/debit card, bank account number, or any other financial-related...

Read More

4 min read

How to Tell if an Email is Fake or Legitimate

Cybercriminals and hackers are getting more sophisticated in terms of how they are exploiting weaknesses and breaking into systems. A common way is...

Read More