Governance, Risk & Compliance

U.S. Election Security (and Insecurities)

It has been a month since the U.S. 2020 General Election has passed. The election, according to then-Director of CISA…

3 days ago

Notable Enhancements to the New Version of NIST SP 800-53

As an infosec professional, you’ve likely heard of the National Institute of Standards and Technology (NIST). If you are unfamiliar…

3 days ago

Canada’s New Data Privacy Bill: the Digital Charter Information Act

On November 17, the Canadian government introduced Bill C-11, better known as the Digital Charter Implementation Act, which will see…

4 days ago

A Look at the Computer Security Act of 1987

U.S. Federal Cybersecurity Today Computer security regulations have come a long way from their early beginnings.  Even before the Federal…

4 days ago

How a Healthcare Leader Unlocked the Secret to Exceptional Patient Care

Technology is transforming the way healthcare organizations deliver patient care. As people continue to hold their… The post How a…

5 days ago

Insider Threats: Risk Assessment Considerations for Remote Work

The outbreak of COVID-19 has led many businesses to transition a large number of employees to remote work. The shift…

5 days ago

Spanning Release Notes: Office 365 Backup MSP Edition

Spanning Office 365 Backup MSP Edition offers comprehensive protection against Office 365 data loss, ensuring seamless business continuity.

5 days ago

The Multi-Million Pound Manchester United Hack

Earlier this year I wrote a blog post about the Manchester City Billion Pound Hack, which explored cyberattacks within elite…

6 days ago

Emerging Public Cloud Security Challenges in 2020 and Beyond

According to last year’s Gartner forecast, public cloud services are anticipated to grow to $USD 266.4 billion by the end…

1 week ago

CYBER Rules: DOD’s DFARS and CMMC Explained

Cybersecurity expert Rob Knake informally interviews top cybersecurity lawyer Evan Wolff regarding an important change to the Cyber Maturity Model…

2 weeks ago