Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

May 2024

The Beatings Ransoms Will Continue Until Morale Culture Improves

As we near the halfway point of 2024, it is apparent that the epidemic of extortionary cyber attacks will continue unabated into the foreseeable future. Now more than ever, I believe that until organizations adopt cultural approaches to cybersecurity, breaches will continue to wreak havoc on companies and industries. But why is this? There are far too many reasons to enumerate here, but in my experience the biggest factors are.

The [Beatings] Ransoms Will Continue Until [Morale] Culture Improves

As we near the halfway point of 2024, it is apparent that the epidemic of extortionary cyber attacks will continue unabated into the foreseeable future. Now more than ever, I believe that until organizations adopt cultural approaches to cybersecurity, breaches will continue to wreak havoc on companies and industries.

Global Assets: Navigating the Cybersecurity Landscape with Argo | Part I

In today’s digital age, organizations are often crippled by a cybersecurity environment that is fragmented and complex. The jumble of security data — from intrusion detection systems to vulnerability management platforms and more — scattered and isolated across various tools, hinders a unified approach to security.

Spring into Action: A Corporate Digital Spring Cleaning Plan

Spring cleaning is no longer just about spotless windows and gleaming floors. In the digital age, businesses need to consider the clutter accumulating in their virtual filing cabinets too. A corporate digital spring cleaning can breathe new life into your organization’s online presence and data management practices.

NIST CSF 2.0: A Deeper Dive into Middle-Earth

Sequels, bah! Usually, they are never as good as the first. Do not even speak of prequels! This is less of a sequel, and rather should be considered a continuation of the first blog. In line with the original blog, there will be a few references to Tolkien’s Lord of the Rings. So, without further ado, you have my sword, and you have my bow, and my axe, or, at the very least, some of my NIST CSF 2.0 insights.

The Surveillance Invasion: IoT and Smart Devices Stealing Corporate Secrets

In an age where manufacturers have decided that just about every device needs to be “smart,” it’s becoming difficult to avoid the data collection and privacy invasion that are often baked into these devices. We have come to expect that smart phones and speakers with built-in digital assistants are always listening, and data collection practices between companies can vary significantly.