FEATURED BLOG
Cybersecurity Framework Assessments: Prioritizing Your Remediation
Cybersecurity framework assessments often reveal numerous gaps, leading to a need for prioritization. This blog explores how to rank and address these issues based on risk analysis, business objectives, and available resources.
Money Matters TV
Matt Barnett talks with Money Matters TV about the current trends and risks for organizations in cybersecurity as well as some tips and tricks to protect yourself against scammers.
The Most Essential Security Measure You're Not Taking
Many people take a rather blasé approach to account security and identity theft. “I know I shouldn’t, but it’s fine” is a common refrain with regards to subpar security practices, such as password reuse. Tales of account compromise are met with a mentality of “that sounds scary, but it won’t happen to me”.... Until it does!
Building Breach Resiliency Through Collaboration
Breach resiliency is centered around building processes to aggregate and action information quickly based on what systems, technologies, etc. you have in your environment. To be effectively resilient to a breach, you must collaboratively build a thorough understanding of your environment, your workflows, your processes, and, last but certainly not least, your specific threats.
Stay Steps Ahead With Assumed Breach Testing
The word 'assume' tends to have a bad reputation. After all, we’re taught from a young age what happens when you 'assume'; however, when it comes to security testing, the ‘Assumed Breach’ approach can be a great way to help your organization gain insight that further improves your defenses.