Employee Cybersecurity: Prevent Holiday Shopping from Compromising Your Network

Employee Cybersecurity: Prevent Holiday Shopping from Compromising Your Network

Employees are continuing to work from home as more and more cases of the pandemic come to light. This increase in cases means that working from home is going to continue for ...
Employee Cybersecurity: Prevent Holiday Shopping from Compromising Your Network

Employee Cybersecurity: Prevent Holiday Shopping from Compromising Your Network

Employees are continuing to work from home as more and more cases of the pandemic come to light. This increase in cases means that working from home is going to continue for ...

Stop Wasting Your Time and Money with a “Checkbox” SCM Solution

By now, we know a lot about secure configuration management (SCM). We know the way it works, the integral processes of which it consists, the areas of your IT infrastructure that it ...

CMMC Level 3 Control – Email Sandboxing (SI.3.220)

An overview for this control states an organization should utilize sandboxing to detect or block potentially malicious email.  The action can prevent malicious files from entering the network and should be document ...

Gearing Towards Your Next Audit – Understanding the Difference Between Best Practice Frameworks and Regulatory Compliance Standards

Security configuration management (SCM) can help organizations do much more than just harden their attack surfaces against intrusions. This fundamental control also has the ability to make your audits flow more smoothly ...

The Center for Internet Security (CIS) Use Cases and Cost Justification

Vince Lombardi, the famous football coach, used to start his training camp each season with a talk about doing the basics. He’d tell the players that they start with the basics, then ...

Understanding the Purpose of Security Controls and the Need for Compliance

What are the brakes on a car designed to do? I have asked this question many times when speaking to customers or organizations who were dipping their toes into the audit space ...
™

The Statement of Applicability in ISO 27001

The SoA (Statement of Applicability) is one of the key documents when it comes to ISO 27001 compliance. It identifies the controls you have selected to address information security risks, explains why ...

Cyber Incidents in Education Escalate into Frustration

Education Cybersecurity Weekly is a curated weekly news overview for those who are concerned about ... The post Cyber Incidents in Education Escalate into Frustration appeared first on EdGuards - Security for ...
White Hat Hacker in Dark Cybersecurity

White Hat Hacker in Dark Cybersecurity

Education Cybersecurity Weekly is a curated weekly news overview for those who are concerned about ... The post White Hat Hacker in Dark Cybersecurity appeared first on EdGuards - Security for Education ...