NIST CSF – Part 2 -Protect

NIST CSF – Part 2 -Protect

The NIST Cyber Security Framework, or NIST CSF,  is the result of a February 2013 Executive Order titled “Improving Critical Infrastructure Cybersecurity” and 10 months of collaborative discussions with more than 3,000 security professionals. It comprises a risk-based...
What is cyber threat hunting?

What is cyber threat hunting?

A buzz term of today’s cybersecurity is ‘threat hunting’. It gives you images of clandestine agents hiding in the shadows, ready to spring into action to neutralize a threat. Well that’s not exactly what cyber threat hunting is, but it’s also not necessarily what many...
5 core functions of effective cybersecurity – #1 Identify

5 core functions of effective cybersecurity – #1 Identify

Since the National Institute of Standards and Technology Cyber Security Framework (NIST CSF) was established, it has become the framework of choice for organizations to align with to establish “best practice”, and is the foundation for most US cyber...
Record fines come on the heels of warnings about cyber risk

Record fines come on the heels of warnings about cyber risk

Record fines come on the heels of warnings from US Intelligence warning of a growing risk to our utility providers.  Similar warnings have been issued for law firms, higher education, and small businesses, so this information is relevant to a wide spectrum of...
Growing Revenue with Foresite

Growing Revenue with Foresite

We are very excited about 2019 as our Reseller Channel continues to grow. We know that in addition to wanting to solve cybersecurity and compliance problems for your clients, you also partnered (or are considering partnering) with Foresite to grow revenue.   Here...
Be Aware of Business Process Compromise

Be Aware of Business Process Compromise

We have all heard about data breaches and compromises that target specific data within an organization. However there are other types of cyber attacks. Today let’s talk about business process compromise. Business Process Compromise (BPC) is when an attacker...