Why we need an industry-focused approach to cybersecurity

| | Blog
There are lots of basic, cybersecurity hygiene rules. Strong authentication, proper cybersecurity training, and patching software are good guidelines that everyone should follow. When you dig into the nuances of effective security, though, it quickly becomes apparent that one size doesn’t fit all. Cybersecurity threats create business risk, and the ... Read More

What can we learn from our online enemies?

| | Blog
In 2021, some of the best cybersecurity advice comes from a 2500-year-old book. In The Art of War, Chinese military leader Sun Tzu said: “If you know the enemy and know yourself, you need not fear the result of a hundred battles.” It’s important to know your enemy, but today they are often ... Read More

Endpoint Detection and Response: To DIY or Not to DIY?

| | Blog
Dissecting EDR  Many organizations struggle with DIY endpoint detection and response (EDR), and stakeholders may question its efficacy and value. The usual path to DIY EDR is for stakeholders to talk to product companies, which by nature focus on products and what they do. Together, they stand up a proof of concept (POC) against a finite list of requirements and complete a purchase. As a ... Read More

Struggling with cyber insurance? Here’s how an MSSP can help

| | Blog
For years, we’ve insured our companies against fire, flood, and theft. Increasingly, we’re also insuring them against cyber-attacks too. The cyber insurance market is only around two decades old, though, and underwriters have struggled to cope with a rapidly evolving environment. As threats evolve, cyber insurance is maturing. That carries ... Read More

6 Steps to Make Every Dollar Spent on Your Cybersecurity Program Count

| | Blog
“No organization has the security budget to be good at everything. A security program should show you where to spend and why, and track your security maturity and compliance in real time.” -Team Nuspire   Facing the Facts  Persistent Challenges  What You Need   Industry Matters  Modernizing Security Programs   Outcomes    1 – Facing the Facts  Security programs are stuck in the past. Aging frameworks ... Read More

Cybersecurity Maturity Model Certification (CMMC): 5 Tips for Successful Compliance

| | Blog
The US Department of Defense (DoD) released the first version of the Cybersecurity Maturity Model Certification (CMMC) on 31 January 2020.  CMMC is the latest in a long line of Defense Industry security standards dating all the way back to the early 2000’s.  Terms like DITSCAP, DIACAP, ITAR, DFARS, and more recently ... Read More