Compliance does not equal security

Buy these widgets. Write these policies. Be compliant. Be secure. While certain industry bodies set specific cybersecurity standards and requirements, following them is not enough to protect your organization from cyber attacks and to achieve resilience. Security started with compliance Compliance was the primary driver for many businesses to build a cyber security program. Starting […]

Continue Reading

Analyzing and implementing a national zero trust architecture

This October, we once again find ourselves observing National Cybersecurity Awareness Month. While this effort traditionally targets consumers and businesses, the U.S. government has a unique interest in cyber awareness. The theme of the first week implores individuals and organizations to #BeCyberSmart, by highlighting best security practices while focusing on general cyber hygiene to effectively […]

Continue Reading

Policy automation to eliminate configuration errors

Far too often, major security breaches can be traced back to a configuration error. Changes and adjustments to network and security configurations are unavoidable; they are a necessary part of managing a company’s technology environment. But it’s important to recognize that they are also risky and can have unexpected consequences – from service interruptions, performance […]

Continue Reading

Add a new dimension to ransomware defenses

Ransomware is a particularly heartless endeavor. Criminals have targeted schools, vital infrastructure, and even patient records at a psychiatric treatment facility. The US Department of Homeland Security recognizes it as a top threat, and security professionals put defensive ransomware strategies at the top of their to-do list. As it is for every other cybersecurity initiative, […]

Continue Reading