Cybersecurity vs. Cloud Security: What is the Difference? Part 1
Regarding technological advancement, cyber and cloud security are critical elements that can either make or break a company's overall IT infrastructure. Cybersecurity analysts must understand both nuances to protect their organization from potential risks. To get us started we know
20 Basic Network Security Concepts You Need to Know
Since we are constantly being bombarded by the terms Artificial Intelligence and Machine Learning I decided to write this blog post with an AI tool. I absolutely had to give it quite a bit of help in terms of adding
Organizations Struggle Implementing Compliance Requirements Including NIST & Zero Trust Mandates
Over the last year, we’ve seen a literally flood of government legislation and formal guidance concerning cybersecurity best practices. New mandates have been coming or to the cyber community fast and furious, and government agencies and their contractors have had
How CASB Solutions are Improving Cloud Security
Cloud access security brokers (CASBs) are on-premises, or cloud-based security policy enforcement points, typically placed between cloud service consumers and their cloud service providers (CSB). The solutions often combine and add enterprise security policies when cloud-based resources are accessed. Further,
Is an MDR Solution or an MSSP Partnership Better for Your Organization?
In this blog post, we want to analyze the differences between a Managed Detection and Response (MDR) solution and a Managed Security Services Provider (MSSP) partnership and how organizations can differentiate between the two and choose which one or both
The Perspective of a Cyber Security Leader – An Interview with Bill Boni
Who is Bill Boni? Retired former Senior Vice President Information Security at T-Mobile USA and Corporate Security Officer at Motorola Bill Boni’s Biography Bill Boni is one of the leading information risk management practitioners based in the USA, with broad experience in all
Developing a Highly Skilled IT Security Workforce
Bill Boni is one of the leading information risk management practitioners based in the USA, with broad experience in all aspects of creating, sustaining, and transforming security protection for organizations. A visionary information security leader with outstanding written and verbal
Four Strategic Principles of Network Security Design
We recently looked at the CIS 20 – a list of 20 key controls that you should implement within your organization to maintain comprehensive cybersecurity. A recurring element in these controls is the importance of protecting your network: controls 9,11
The CIS 20 Foundational – Beyond the Basics
Beyond the Basics — CIS 20 Part Two – Controls 7-16 All organizations need a roadmap for their cybersecurity defense. Piecemeal or fragmented defense strategies, in response to the latest cyberthreat, leave gaps for attacker exploitation. The Center for Internet Security
2020 Top 5 Cyber Security Predictions
Top 5 Cyber Security Predictions for 2020 In conversations with industry analysts, our customers, combing through the statistics like Comparitech's breach data and ultimately talking amongst ourselves we came up with 5 IT security predictions for 2020 that may not be