Skip to main content

Whitepapers

  • cyber security

    Technical Analysis of Android X-Agent

    Focal Point's technical analysis of the Android variant of the X-Agent malware implant in order to shed light on its use and capabilities. Focal Point's analysis sheds light onto the attribution of this malware, and whether it could have been used in targeted airstrikes of Ukrainian artillery.

    • Published:

    • Category:Cyber Security

  • cyber security

    5 Biggest Pitfalls of Identity and Access Management (and How to Avoid Them)

    We've worked with hundreds of companies on IAM implementations big and small.  Here are the traps they fall into most often, and some practical steps for avoiding those pitfalls in your company.

    • Published:

    • Author: Aaron Perry

    • Category:Cyber Security

  • audit

    5 Reasons for an IAM Audit

    Assessing the maturity of your IAM program regularly is the key to reducing breaches, lifting the burden on your IT help desk, and improving efficiency across the organization.

    • Published:

    • Author: Bruce Bird

    • Category:IT/Internal Audit

  • data privacy

    The Essential Guide to GDPR Compliance

    The European Union's (EU) General Data Protection Regulation (GDPR) is changing corporate data privacy practices and programs across the globe.

    • Published:

    • Category:Data Privacy

  • data privacy

    Privacy Shield Framework: What You Need To Know

    The EU-US Privacy Shield Framework brings a host of changes to organizations managing EU data.  This quick overview combines everything you need to know about these changes with some practical guidance on beginning to implement the new requirements.

    • Published:

    • Category:Data Privacy

  • audit

    Unmasking Shadow IT: How to Limit the Dangers

    In our latest infosheet, we take a closer look at why employees use shadow IT, the dangers of shadow IT, and how to limit the use of shadow IT within your organization.

    • Published:

    • Category:IT/Internal Audit

  • data privacy

    The Vendor Management Lifecyle

    The number of data breaches attributed to third parties increases significantly each year; however, many companies are doing little to protect their organizations’ valuable data from a third-party breach. Download this free whitepaper below:

    • Published:

    • Author: Melinda Tijerino

    • Category:Data Privacy

  • data analytics

    Five Common Pitfalls of Data Analytics

    Focal Point's Data Analytics team addresses the five most common pitfalls that limit the effectiveness of data analytics within internal audit. These include:

    • Published:

    • Category:Data Analytics

  • data privacy

    HIPAA in the News: Case Studies

    Focal Point's HIPAA compliance experts are bringing you summaries of recent, notable events in the world of HIPAA regulations.

    • Published:

    • Author: Melinda Tijerino

    • Category:Data Privacy

  • data privacy

    HIPAA in the News: Audit Protocol 2.0

    In this edition of HIPAA in the News, Focal Point's Data Privacy experts summarize key changes in the newly released HIPAA audit protocol. This piece takes a look at:

    • Published:

    • Author: Melinda Tijerino

    • Category:Data Privacy