Jacqueline von Ogden

Breaking Down CIS Foundational Controls

Effective cybersecurity programs many times utilize a layered approach. Spending a vast sum on advanced protection systems can be pointless…

5 months ago

Preventing Cyber Attacks With CIS Basic Controls

Enterprise-level organizations have access to a vast range of security tools, resources, standards, and advice. Utilizing free and paid threat…

6 months ago

Mitigating Zero Day Threats

DATA SECURITY PODCAST In a recent podcast interview with Steve Morgan, editor-in chief of Cybercrime Magazine, Robert E. Johnson, III,…

6 months ago

Breaking Down CIS Controls

Cybersecurity is a huge field, and one that may feel as if it can never be ‘completed’ by many within…

6 months ago

Enhancing SIEM Data with File Integrity Monitoring

DATA SECURITY PODCAST In a recent podcast interview with Steve Morgan, editor-in chief of Cybercrime Magazine, Robert E. Johnson, III,…

6 months ago

Analyzing SIEM Data with Integrity Monitoring

DATA SECURITY PODCAST In a recent podcast interview with Steve Morgan, editor-in chief of Cybercrime Magazine, Robert E. Johnson, III,…

6 months ago

CIS Benchmarks Boost Security, Integrity, and Compliance

Secure configuration is the foundation of cybersecurity and compliance, and as previously discussed, CIS benchmarks are the accepted best practice.

6 months ago

How To Reduce Your Attack Surface with System Hardening

In most instances, new digital assets, such as servers and operating systems, come in an unconfigured state. When an asset…

7 months ago

Is All FIM Software Equal?

DATA SECURITY PODCAST In a recent podcast interview with Steve Morgan, editor-in chief of Cybercrime Magazine, Robert E. Johnson, III,…

7 months ago

Why CIS Benchmarks are Critical for Security and Compliance

The cybersecurity industry gives a lot of attention to protective solutions like firewalls and EDRs. And that makes sense. These…

7 months ago