BLOG

What is a Cybersecurity Maturity Model?

What is a Cybersecurity Maturity Model? It is a framework of security controls combined with a standardized way of measuring the maturity of each area or pillar. It is repeatable and conformed to a process. Because the process is repeatable, the system can be used for...

Minnesota Cybersecurity Consultants

Are you looking for a cyber security consultant in Minneapolis / St. Paul Minnesota area to help you with your information security program? Look no further, you’ve found the right place.     Finding the right consultant is difficult. Industry demands combined with...

Weighing Compliance on your Cybersecurity Program

How do you weigh compliance in your information security program? Does it take the most important place, the front seat to all other initiatives? Or is it an afterthought that is no longer practical in today's cybersecurity landscape? So many companies that were...

How to Rank Security Findings / Risk Treatment

For an information security analyst or security consultant, it is your primary mission to identify and prioritize risk and then focus your efforts on getting the greatest risk return. Before we discuss how to rank security findings, let's elaborate on the idea of...

Cross-Site Scripting (XSS): OWASP Top 10

  Welcome to our OWASP Top 10 series. This series aims at equipping you with foundational security concerns that exist in today's cybersecurity landscape. The best resource to use for this is the OWASP Top 10. If you haven't seen it, take some time to visit the page....

Criticality of Awareness Training

When I work with a client,  that has no formal information security plan or framework, the first thing I recommend getting started on is a security awareness program. This is a fancy way of saying "training staff how to identify, reduce, and react to suspicious...