Blog
Cultivate & Motivate
Learnings, teachings and tips & tricks for anyone to reference or review. All questions welcomed; no conversation is too big or too small.
Is Our Critical Infrastructure on the Verge of a Security Crisis?
Consider a scenario where a nation-state adversary successfully infiltrates the control systems of a major power grid. With malicious intent, they could manipulate the distribution of electricity, causing widespread blackouts and chaos. The impacts would ripple through hospitals, transportation networks, and financial institutions, plunging the nation into darkness and bringing life as we know it to a standstill. The mere thought of such a scenario underscores the urgency of the challenges we face.
Mastering the Matrix: Unleashing the Power of 'Once Done, Map to Many' in Cybersecurity Compliance
I'll bet you're frustrated to hear "yet another cybersecurity assessment requirement" is impacting your business. A fair sentiment, considering the mounting responsibilities placed on organizations in an increasingly digital and data-driven world. Often it feels like you're reinventing the wheel, ensuring compliance to a myriad of regulations and standards, with limited resources, high uncertainty, and a seemingly redundant pattern of effort.
Zen and the Art of Representative Sampling
Sampling is an indispensable part of a cybersecurity audit. It's the method by which auditors select a subset of the overall audit scope, such as certain data, systems, or processes for in-depth review. While sampling is addressed in some industry standards like ISO 19011:2018, its application in a cybersecurity context requires a unique approach. This guide aims to define the concept of sampling in cybersecurity audits and provide specific criteria for auditors.
Your VPN Gateway: Secure Passage or Trojan Horse?
Imagine you're Sarah, a defense contractor analyst for a large corporation, connecting from a hotel's Wi-Fi network. You're conscientious about security, so you use your VPN to work on documents that contain Controlled Unclassified Information (CUI). But what if, unknowingly, your VPN connection drops? Your device, oblivious to this change, continues to send and receive data over the unprotected hotel network. Suddenly, your secure document isn't so secure.
It’s not just TikTok, Folks: A Critical Reevaluation of BYOD Policies Amidst Spying Controversies
It’s not just TikTok folks; a reminder of the Big Eye at the center of a NatSec debate on PokeMon Go
Can AI Instances Dream?
From the realms of science fiction, the prospect of sentient machines has crossed the boundary into the cold, hard light of reality. We're standing on the precipice of a new age, teetering on the edge of a Twilight Zone-esque possibility: Could our computers, through some unprecedented occurrence, become sentient?
The Cybersecurity Conundrum: Are Executives Looking Through the Wrong End of the Telescope?
In an era of sophisticated cyber threats, business leaders face a daunting challenge: maintaining cybersecurity compliance while simultaneously establishing a robust and scalable cyber resilient architecture. However, some executives may be approaching this challenge from the wrong perspective, overly fixated on ever-changing federal regulations and neglecting the fundamental task of building a comprehensive cybersecurity infrastructure.
Strange But True: Unbelievable Cybersecurity Stories from the United States
The world of cybersecurity is replete with bizarre and eye-opening tales that seem straight out of a Hollywood script. But as they say, truth is often stranger than fiction. As we strive to stay ahead in the cyber race, let's delve into some truly fascinating, but equally strange cybersecurity stories from the United States that shed light on the dangers of this shifting digital landscape.
Raising the Cybersecurity Bar: Unpacking the NIST 800-171 rev 3 and its Implications on the Defense Supply Chain
In an era of escalating digital threats, robust cybersecurity measures are critical, particularly for the defense supply chain that underpins national security. The latest release of the National Institute of Standards and Technology (NIST) Special Publication (SP) 800-171 revision 3 accentuates this need, prompting a call to action for a more aggressive cybersecurity stance within our defense supply chain.
A House, Divided
In the midst of the ongoing conflict between Ukraine and Russia, a new front has emerged - one that is equally dangerous but much less visible. It is the war in cyberspace, where Russia's President Vladimir Putin has been waging an aggressive campaign against the United States and its allies. This cyber war is not only a threat to our national security, but also to our critical infrastructure, emergency services, and warfighters on the front line.
Start your journey
What’s stopping you from connecting with a resource that can and will help your organization successfully and efficiently navigate the compliance quagmire.? Go on, pick up the phone - it really is that easy.