by Ryan Hamrick | Oct 24, 2022 | Security
The SBOM is an essential tool in cyber defense and compliance management What is a Software Bill of Materials? A bill of materials (BOM) is a concept from physical supply chains. In essence, it’s a receipt on steroids. A BOM lists identifying information about...
by John Bruggeman | Oct 21, 2022 | Security
How concepts from the CIA Triad affect personal information Information security and information privacy defined While it may be easy to conflate the two, information privacy is not the same as information security. For information security professionals, the...
by Justin Hall | May 31, 2022 | Security
Happy summer, everyone! To celebrate, there’s a new Microsoft Windows zero-day vulnerability, currently classified by NVD as CVE-2022-30190, and nicknamed by the community as Follina. It exploits a flaw in the Microsoft Support Diagnostic Tool (MSDT) that uses the...
by John Bruggeman | Feb 2, 2022 | Security
Your brain is constantly working to detect threats to your safety–whether you realize it or not. When visiting an unfamiliar place, your senses take in stimuli, which your brain uses to protect you. For enterprises, defensive cybersecurity systems have the same goal....
by John Bruggeman | Dec 17, 2021 | Security
So far in this cybersecurity framework series, we’ve covered NIST CSF and ITSG-33 frameworks and CIS Controls as options for organizations to secure their IT environment. In this blog, we’ll peek behind the enemy lines of cyber crime by exploring the MITRE ATT&CK...
by John Bruggeman | Dec 15, 2021 | Security
Our previous blog post explored how security frameworks like ITSG-33 and the NIST Cybersecurity Framework (CSF) can help make your enterprise ransomware resistant. While there is a lot of information out there about these frameworks, the complicated steps recommended...