As an infosec professional, you’ve likely heard of the National Institute of Standards and Technology (NIST). If you are unfamiliar…
To paraphrase an old saying: “One person’s prevention is another person’s protection.” This may well apply to the wearing of…
The outbreak of COVID-19 has led many businesses to transition a large number of employees to remote work. The shift…
Sonrai Security has sponsored and moderated boardroom discussions with Evanta CISOs and we wanted to share our key public cloud…
According to the 2020 Deloitte-NASCIO Cybersecurity Study for state governments, 54 percent of states are not confident in their ability…
Digital attack attempts in industrial environments are on the rise. In February 2020, IBM X-Force reported that it had observed…
If you are reading this, you may have decided to upgrade your ad-hoc cybersecurity program to be compliant with the…
Identity and Access Management programming (IAM) protects your organization on two fronts: It ensures that only appropriately authorized entities (human,…
Policy compliance within the information security space can be an exhausting concept to wrap our heads around. Writing a policy…
Security continues to be a top concern for cloud customers, and therefore continues to be a driver of our business…