Blog

  • 7 Steps to Implementing a Zero Trust Architecture

    7 Steps to Implementing a Zero Trust Architecture

    Nowadays, all kinds of companies are expanding their horizons and pushing their boundaries beyond what can be done in a physical office space. Even before the COVID-19 pandemic and its effects on businesses across the world, mobility and flexibility have been strategic priorities. Now, our new normal has made most businesses at least partially remote.

    (more…)

  • Top Tech for Your Zero Trust Cybersecurity Architecture

    Top Tech for Your Zero Trust Cybersecurity Architecture

    “Do not trust anyone!” The catchphrase that best describes zero trust, is a security concept encouraging organizations to automatically distrust all network activity. As this security concept gains traction, many security providers are flooding the market with solutions. In this article, we will unpack the top technologies for a zero trust cybersecurity architecture. 

    (more…)

  • What are Incident Response Tabletop Exercises?

    What are Incident Response Tabletop Exercises?

    No matter how proactive a company’s approach is to its cybersecurity practices, chances are they will be the target of a cyber-attack. Statistics show that it’s not a question of if one occurs, but when. This is where Incident Response Tabletop exercises come in.

    (more…)

  • NERC vs. NIST: Choosing the Right Infrastructure Cybersecurity Framework

    NERC vs. NIST: Choosing the Right Infrastructure Cybersecurity Framework

    Cybersecurity implementation can be a long and complicated process if your organization hasn’t been built with security as a part of its design. This is why different committees, interest groups, governments, and cybersecurity professionals come together to develop robust cybersecurity frameworks and regulations.

    Depending on the industry that your organization is part of, these frameworks and regulations may be known to you as CIS CSC, NIST, ENISA, ISO 27001 ect. With so many frameworks it is hard to know which is best suited to your organization’s needs. Although all frameworks have their merit, some pertain to either specific industries or requirements.

    (more…)

  • How to Build and Maintain Proper Data Center Security

    How to Build and Maintain Proper Data Center Security

    Consumers and employees expect access at all times, which relies on data centers operating 24/7. But if data center security measures aren’t strong, operational reliability is called into question.

    Over the years, the methods for establishing, monitoring, and upkeeping data centers should have evolved as technology did. Yet, a 2018 Gartner report found that approximately 70 percent of data center networking tasks are performed manually, which increases time, cost, and the likelihood of errors, and reduces flexibility.

    Foregoing automation and other new safeguards in exchange for outdated methods put data centers at risk. Learn about the critical data center security requirements that will keep hackers out now – and well into the future.

    (more…)

  • Elements to a Great Network Diagram

    Elements to a Great Network Diagram

    Network diagrams form the blueprints for security programs in the 21st Century. Unfortunately, creating and maintaining these network architecture diagrams has become the IT equivalent to bookkeeping – it’s a fairly simple task that few people enjoy.

    To be fair, documenting one’s network is tedious. Also, today’s fast-paced digital environment requires most businesses to expand rapidly. Digital transformation – on any level – significantly increases a company’s attack vectors. According to Forbes Insights:

    (more…)

  • What’s the difference between a virtual and fractional CISO?

    What’s the difference between a virtual and fractional CISO?

    If you’re looking for ways to bulk your cybersecurity, you may have already heard about partnering with a chief information security officer, or CISO. Small and medium-sized businesses in the market for CISOs are turning their attention to new, affordable solutions, namely fractional CISOs and virtual CISOs.

    (more…)

  • Top Threats That Require Third-Party Risk Management

    Top Threats That Require Third-Party Risk Management

    Vendor related cyber risks are quickly becoming a major contributing factor to data breaches and cyberattacks worldwide. The way business is conducted today often requires little interaction but has massive networks. The coupling of these extensive networks and outsourcing potentials can leave organizations in the dark about their suppliers and partners’ cybersecurity capabilities. In this article, we will discuss some of the top cyber threats that your organization can mitigate using  third-party security risk assessment.

    (more…)

  • Basics of Third-Party Risk Management in Healthcare

    Basics of Third-Party Risk Management in Healthcare

    In today’s world, many businesses are mobilizing their workforces. More and more services are being outsourced to external organizations, and it’s no different in healthcare. But that process also entails many risks, as even the most careful company often can’t account for every loophole in its vendors’ defenses. That’s why third party risk management in healthcare is absolutely vital for everyone.

    (more…)

  • How Your Business Can Prepare For California’s Privacy Act

    How Your Business Can Prepare For California’s Privacy Act

    The year 2020 saw the California Consumer Privacy Act (CCPA) enforcement, a landmark law that provides the most comprehensive consumer data protection in the United States of America. Its effects are far-reaching, especially for businesses. This is why it is crucial to have a thorough approach to comply with its requirements. When it comes to how to prepare for CCPA, we will guide you through everything you need to know.

    (more…)