Blog

Header_strip
blog-bg-shape

Posts about:

GRC

AI, Data Security and Data Governance
As organizations continue to invest in AI and AI-powered software, “Da...
Read More
The Intersection of CISOs & Data Governance
UNDERSTANDING THE INTERSECTION OF CYBERSECURITY AND DATA GOVERNANCE Cy...
Read More
The Storm Has Passed: Post-Incident Activities for Resilient Cybersecurity
In part one, part two, and part three of this blog series, we have dis...
Read More
Navigating Incident Response: A Deep Dive into NIST 800-61 Containment, Eradication, and Recovery
In part one and two of this blog series, we have discussed considerati...
Read More
Navigating the Detection and Analysis Phase in NIST 800-61 for Efficient Incident Response
In part one of this four-part blogs series, we explored the Preparatio...
Read More
Navigating the Preparation Phase of NIST 800-61: A Foundation for Effective Incident Response
In this four-part blog series, we will be taking a deeper dive into th...
Read More
Cybersecurity Essentials: 3 C’s of Policies and Procedures
Lack of governance documentation, such as policies and procedures, is ...
Read More
Why Cyber Maturity Doesn’t Slow Down Over the Summer
Overview It’s summertime! That means fun in the sun, beach days, time ...
Read More
Supply Chain Risk Management
After four years, the effects of the COVID-19 pandemic can still be fe...
Read More
March Madness - Security Frameworks Sweet Sixteen
**Updated 3/25 with final bracket results** We are excited to announce...
Read More
What's New with NIST CSF 2.0
Image source: https://www.nist.gov/news-events/news/2024/02/nist-relea...
Read More
Breakdown of the MOVEit Transfer Breach and MITRE ATT&CK Mapping
What Happened? MOVEit Transfer is Progress Software’s managed file tra...
Read More
How the SEC Views Materiality
The Securities and Exchange Commission (SEC) has adopted a new rule th...
Read More
Updated SEC Rules on Cybersecurity
On July 26th, the Securities and Exchange Commission adopted their muc...
Read More
Coming to the Table(top) for Incident Response
It's no secret that organizations are heavily reliant on technology to...
Read More

    Subscribe

    Stay up to date with cyber security trends and more