BLOG
Using Microsoft Security Score to Improve Your Cloud Posture
In this article I’m going to walk through my approach using Microsoft Security Center and what steps you can take to immediately reduce risks associated with having Azure cloud. Microsoft defines Cloud Security Posture Management (CSPM): identifies and remediates...
How to Cybersecurity Threat Modeling
Your ‘risks’ are only as accurate as the ‘threats’ you’ve identified. You need a threat modeling practice. Introduction A great cybersecurity program starts with the foundational ability of determining cyber risk. Although there is a not a certified, industry standard...
How to Perform a Cybersecurity Risk Assessment (to identify and prioritize your program)
A great cybersecurity program starts with a risk assessment process. A proper cybersecurity risk assessment clarifies the cyber risks to the business so that cyber initiatives and a road map can be put to together to address the risks. Challenges: When the risk...
Cybersecurity Risk Assessment Funnel – Part #4: Security Standards
Security Standards Having a security standard in your risk assessment process is a lot like dating. You probably started dating without creating a premeditated standard of what you were looking for. But as time went on, you started to notice some things about the...
Cybersecurity Risk Assessment Process Funnel – Part #3: Policy
Policy The people you need to participate in the risk assessment process will not join you because it’s fun. They’ll only do it if it’s required. You are going to be causing a stink asking for people to participate in the risk assessment process. Everyone from the...
Cybersecurity Risk Assessment Funnel – Part #2: People
In the previous article how to ‘Build a Cybersecurity Risk Assessment Funnel,’ we addressed the challenges facing IT directors and security leaders trying to reduce risk by applying a repeatable methodology to identify and report on the risk of company assets,...
Build a Cybersecurity Risk Assessment Process Funnel
If you’re the director of IT for your company, you know without a doubt that there are too many systems, applications, and assets to perform risk assessments on. You’re trying to improve your cybersecurity program and reduce risk by implementing a cybersecurity risk...
How to Respond to Cybersecurity Questionnaires
Have you ever been in this situation? You’re looking forward to that new partnership, or bringing on that new client, and then you receive a cybersecurity questionnaire. The shock initially confuses you because you thought you were further along in the process than...
How To Encrypt an External Hard Drive
HOW TO ENCRYPT EXTERNAL HARD DRIVE? A hard disk drive is also known as a hard disk, hard drive, or fixed disk. It is an electromechanical data storage device. It uses one or more rigid fast rotating platters, which are coated with magnetic material to store and...
What Are the Types of Cybersecurity?
What are the Types of Cyber Security? What would your life look like without your electronics? Could you cope? Probably not. Our mobile devices, computers, and other devices are nearly inseparable from us. Individuals and businesses alike rely on electronics to...