BLOG
Artificial Intelligence in Cybersecurity
The digital platform is ever evolving. And with these changes happening everyday, cybersecurity professionals are locked in a constant arms race against malicious actors. According to reports, cybercrime is predicted to soar in the upcoming years. As these threats...
How IT Leaders Harness AI for Cybersecurity and Beyond
Artificial intelligence offers immense promise for shoring up cyber defenses and streamlining operations. Here's how forward-thinking IT leaders are tapping into AI's potential. 1. Artificial Intelligence for Cyber Security Cyber threats are growing more...
Cybersecurity Guide: SEC Cyber Breach Reporting Requirements
Cybersecurity Guide to SEC's Breach Reporting Requirements The cybersecurity landscape is ever-evolving, and staying ahead of the curve is crucial for businesses in the digital age. The U.S. Securities and Exchange Commission (SEC) has recently proposed new...
Six Tasks to Prepare for New SEC Cybersecurity Reporting Rule
As the cybersecurity landscape continues to evolve, organizations find themselves on the brink of a significant regulatory shift. The impending SEC data breach regulations, poised for implementation, carries profound implications for how businesses manage and disclose...
Why You Need a Vulnerability Management Program
Defining Vulnerability Management Vulnerability Management is a cybersecurity operation to check for vulnerabilities that exist within the current technology stack of drivers, operation systems, and applications so that risk treatment can be conducted. You need a...
Using Microsoft Security Score to Improve Your Cloud Posture
In this article I’m going to walk through my approach using Microsoft Security Center and what steps you can take to immediately reduce risks associated with having Azure cloud. Microsoft defines Cloud Security Posture Management (CSPM): identifies and remediates...
How to Cybersecurity Threat Modeling
Your ‘risks’ are only as accurate as the ‘threats’ you’ve identified. You need a threat modeling practice. Introduction A great cybersecurity program starts with the foundational ability of determining cyber risk. Although there is a not a certified, industry standard...
How to Perform a Cybersecurity Risk Assessment (to identify and prioritize your program)
A great cybersecurity program starts with a risk assessment process. A proper cybersecurity risk assessment clarifies the cyber risks to the business so that cyber initiatives and a road map can be put to together to address the risks. Challenges: When the risk...
Cybersecurity Risk Assessment Funnel – Part #4: Security Standards
Security Standards Having a security standard in your risk assessment process is a lot like dating. You probably started dating without creating a premeditated standard of what you were looking for. But as time went on, you started to notice some things about the...
Cybersecurity Risk Assessment Process Funnel – Part #3: Policy
Policy The people you need to participate in the risk assessment process will not join you because it’s fun. They’ll only do it if it’s required. You are going to be causing a stink asking for people to participate in the risk assessment process. Everyone from the...