Category

Digital Transformation
Here we go over the steps and preplanning that need to be taken after a cybersecurity incident to get your business back to operational and restore public trust.    Moving into the final stage of the NIST cybersecurity framework, we now enter the “Recover” function. The activities involved in this function would take place after an...
Read More
As we continue our journey with NIST, Here we show you what it means to “protect” while providing our readers with industry best practices towards your security program. A cybersecurity program’s “Protect” function is often the most thought-about area that organizations consider when looking to enhance their security program. It’s also the second of five...
Read More
The NIST Security Framework is the ultimate roadmap for which the United States government outlines how businesses can develop their cybersecurity program to account for the threat landscape that is forever evolving. The framework is long and detailed but can be more easily understood when the recommended best practices and security measures are broken down...
Read More
Thinking of adopting Zero Trust. Here are some fundamental principles you need to know. What is the Zero Trust Security Officially named in 2010, a network security model was introduced to secure organizations’ evolving IT infrastructure, which became more vulnerable after heavily incorporating cloud-based applications and databases into their current IT management strategy, creating a...
Read More
To fully digitize the last mile of business, you need to distribute compute power where it’s needed most — right next to IoT devices that collect data from the real world. As technology extends deeper into every aspect of business, the tip of the spear is often some device at the outer edge of the...
Read More
Existing and new challenges, from supply chain hacks to 5G rollouts, will continue to test the expanded role of security teams. CISOs faced a number of challenges in 2020, not the least of which was COVID-19 and the mass migration from onsite to remote work. Maybe for the first time, corporate leadership saw just how...
Read More
Written by David Puzas The adoption of the cloud has fundamentally changed the game when it comes to how businesses go to market and develop modern applications. Today’s application lifecycle places a premium on speed to market, requiring cloud teams to build cloud-native applications supported by a programmable infrastructure that enables businesses to change and reconfigure...
Read More
Insider Risk is defined as  “The risk an insider is any person with authorized access to an organization’s resources to include personnel, facilities, information, equipment, networks, or systems”. A lot of organizations struggle with insider risk because the very nature of the risk comes from those who you trust with your systems and authorizations. From...
Read More
Cybersecurity compliance isn’t something you can accomplish easily. There are an overwhelming number of acronyms, controls, and laws that leave many scratching their head. Compliance requirements vary and can be imposed by law, non-government regulatory bodies, and even private industry groups. Cybersecurity Compliance involves meeting various “conditionals” or controls to protect the confidentiality, integrity, and...
Read More
An incident response plan is a“set of instructions to help IT staff detect, respond to, and recover from network security incidents. These types of plans address issues like cybercrime, data loss, and service outages that threaten daily work.” Generally, an Incident Response plan is created before any incidents occur. Although, most companies have taken a...
Read More
1 2 3 4 5