by Tony Asher | Jul 3, 2019 | Blogs
The role of a CISO is critical within a business that has significant risk and needs to implement and maintain an operational security program. But hiring this role is expensive, and it can be hard to qualify and identify the right candidate. A growing popular...
by Tony Asher | Jul 1, 2019 | Blogs
Minnesota is a hotbed of cybersecurity talent. To access that amazing talent, you should partner with a local cybersecurity company. If you’re looking to for cybersecurity help with advisory services, consulting, or initiatives and want to support local...
by Tony Asher | Jun 26, 2019 | Blogs
Security testing developer applications Do you have an application that was developed to purchased and you’re wrestling with whether to pay for it to be security tested or not? So when should you penetration test an application? You should pen test an...
by Tony Asher | Jun 26, 2019 | Blogs
A Security incident handling and response plan is a premeditated plan on how you will determine, classify, and respond in an organized and prepared manner to a cyber attack that potentially impacts the business. Your goal is to reduce the impact of the incident...
by Tony Asher | Jun 25, 2019 | Blogs
Do you development software or applications internally? Photo by Émile Perron on Unsplash Support for internally developed applications can allow speed to market, customization, and even a competitive advantage. Common problems are supportability, security, and...
Recent Comments