Foundational Controls
What is Asset Discovery? A Look Beneath the Surface
The corporate network can be a busy place with devices connecting, reconnecting and disconnecting every day. With the ever-growing landscape of today’s corporate networks, the difficulty of knowing and understanding what is ...
The Rundown on Google’s Cloud Security Foundations Guide
Google recently released the new Cloud Security Foundations Guide. We’re going to take apart Google’s guide and show you what’s worth looking into. First, an introduction. “This comprehensive guide helps you build ...
Foundational Controls Make the Hard Things Easier to Do
Let’s begin with a short story. Imagine that we have two large organizations in the public sector. These entities are very similar. Both are on the receiving end of cyber threats. Both ...
How Do You Measure Your Investment in Security?
When evaluating enterprise security tools for their effectiveness, it can be challenging to find the right model for best calculating your “Return on Security Investment” (ROSI). Just a few years ago, the ...
Security vs. Compliance: What’s the Difference?
Security and compliance – a phrase often uttered in the same breath as if they are two sides of the same coin, two members of the same team or two great tastes ...
The UK’s Minimum Cyber Security Standard: What You Need to Know
In June 2018, the UK Government, in collaboration with NCSC (National Cyber Security Centre), produced a new security standard that all Government “Departments”, including organisations, agencies, arm’s length bodies, and contractors must ...
How Foundational Controls Can Be Used to Help Fight Back Against Digital Security Challenges
On 26 March, the UK government unveiled its Cyber Security Export Strategy. The Department for International Trade (DIT) created this strategy to help the United Kingdom capitalize on the world’s ever-evolving digital ...
3 Emerging Innovations in Technology that Will Impact Cyber Security
It goes without saying that innovations and trends in technology have a direct impact on digital security. Just look at what happened with COVID-19. As organizations switched their workforces to remote connectivity, ...