Notable Enhancements to the New Version of NIST SP 800-53

As an infosec professional, you’ve likely heard of the National Institute of Standards and Technology (NIST). If you are unfamiliar with NIST, it is an organization that produces many publications including the ...

Cybersecurity Lessons from the Pandemic: Protection

To paraphrase an old saying: “One person’s prevention is another person’s protection.” This may well apply to the wearing of masks during the pandemic, the efficacy of which is still being hotly ...

Insider Threats: Risk Assessment Considerations for Remote Work

The outbreak of COVID-19 has led many businesses to transition a large number of employees to remote work. The shift could end up becoming a long-term trend; it’s expected to continue after ...
CISO Blog Image

CISO Roundtable: What We’ve Heard, and What We’re Looking Forward To

Sonrai Security has sponsored and moderated boardroom discussions with Evanta CISOs and we wanted to share our key public cloud takeaways. The post CISO Roundtable: What We’ve Heard, and What We’re Looking ...
Remote workforce, web portal, and DevSecOps: Three focus areas for cybersecurity

Remote workforce, web portal, and DevSecOps: Three focus areas for cybersecurity

  According to the 2020 Deloitte-NASCIO Cybersecurity Study for state governments, 54 percent of states are not confident in their ability to protect emerging technology. Traditional cybersecurity approaches can result in singularly focused ...

CEOs Will Be Personally Liable for Cyber-Physical Security Incidents by 2024

Digital attack attempts in industrial environments are on the rise. In February 2020, IBM X-Force reported that it had observed a 2,000% increase in the attempts by threat actors to target Industrial ...
Operationalize the NIST Cybersecurity Framework Without Pulling All Your Hair Out

Operationalize the NIST Cybersecurity Framework Without Pulling All Your Hair Out

If you are reading this, you may have decided to upgrade your ad-hoc cybersecurity program to be compliant with the NIST Cybersecurity Framework. Your CEO or audit committee might have asked about ...
CISO Blog Image

Security in the Cloud: IAM and Data Access Control

Identity and Access Management programming (IAM) protects your organization on two fronts: It ensures that only appropriately authorized entities (human, […] The post Security in the Cloud: IAM and Data Access Control ...

What is Policy Compliance? Four Tips to Help You Succeed

Policy compliance within the information security space can be an exhausting concept to wrap our heads around. Writing a policy document, publishing it to staff and then staying hands-on to ensure it ...
Hearing from CISOs at Google Cloud and Beyond

Hearing from CISOs at Google Cloud and Beyond

Security continues to be a top concern for cloud customers, and therefore continues to be a driver of our business at Google Cloud. However, specific security priorities vary wildly by vertical, by ...