Overlooked Benefits of Hiring a vCISO

The role of a CISO is critical within a business that has significant risk and needs to implement and maintain an operational security program. But hiring this role is expensive, and it can be hard to qualify and identify the right candidate.  A growing popular...

Minnesota Cybersecurity Companies

Minnesota is a hotbed of cybersecurity talent. To access that amazing talent, you should partner with a local cybersecurity company.  If you’re looking to for cybersecurity help with advisory services, consulting, or initiatives and want to support local...
When to Pen Test an Application?

When to Pen Test an Application?

Security testing developer applications Do you have an application that was developed to purchased and you’re wrestling with whether to pay for it to be security tested or not? So when should you penetration test an application? You should pen test an...

How to Build a Computer Security Incident Response Plan

A Security incident handling and response plan is a premeditated plan on how you will determine, classify, and respond in an organized and prepared manner to a cyber attack that potentially impacts the business. Your goal is to reduce the impact of the incident...

4 Questions to Prevent Passive Programmer Security

Do you development software or applications internally?  Photo by Émile Perron on Unsplash Support for internally developed applications can allow speed to market, customization, and even a competitive advantage. Common problems are supportability, security, and...