by Tony Asher | Feb 13, 2023 | Blogs
In this article I’m going to walk through my approach using Microsoft Security Center and what steps you can take to immediately reduce risks associated with having Azure cloud. Microsoft defines Cloud Security Posture Management (CSPM): identifies and remediates...
by Tony Asher | Aug 26, 2022 | Blogs
Your ‘risks’ are only as accurate as the ‘threats’ you’ve identified. You need a threat modeling practice. Introduction A great cybersecurity program starts with the foundational ability of determining cyber risk. Although there is a not a certified, industry standard...
by Tony Asher | Aug 15, 2022 | Blogs
A great cybersecurity program starts with a risk assessment process. A proper cybersecurity risk assessment clarifies the cyber risks to the business so that cyber initiatives and a road map can be put to together to address the risks. Challenges: When the risk...
by Tony Asher | Dec 7, 2020 | Blogs
Security Standards Having a security standard in your risk assessment process is a lot like dating. You probably started dating without creating a premeditated standard of what you were looking for. But as time went on, you started to notice some things about the...
by Tony Asher | Nov 16, 2020 | Blogs
Policy The people you need to participate in the risk assessment process will not join you because it’s fun. They’ll only do it if it’s required. You are going to be causing a stink asking for people to participate in the risk assessment process. Everyone from the...
Recent Comments