
Access Discovery and User Access Reviews
A first step to secure identities is an access discovery. This is an inventory of who has access to what. For outsiders –
A first step to secure identities is an access discovery. This is an inventory of who has access to what. For outsiders –
Note: This article is an abbreviated version of an article submitted to the Association of Certified Fraud Examiners (ACFE) journal. Overview: Access/Identity control is a
U.S. President Joe Biden laid out his plans to secure the future of America’s digital ecosystem in the latest US National Cybersecurity Strategy, released March
Great message by US Cybersecurity and Infrastructure Security Agency Director Jen Easterly. In an address to Carnegie Mellon University, she warned that Chinese hackers are
When it comes to developing and selling software to the US government, companies are under a new set of guidance. Two years ago Executive Order
The worldwide infrastructure as a service (IaaS) market grew 41.4% in 2021, to total $90.9 billion, up from $64.3 billion in 2020, according to Gartner.
NIST SP 800-171 is the basis of the US government’s Cybersecurity Maturity Model Certification (CMMC) 2.0. CMMC is designed to ensure that defense contractors are
The NIST CyberSecurity Framework offers solid guidance for how organizations should select and maintain customized security and privacy controls for their information systems. NIST CSF is
As we look forward into 2023, NIST SP 800-53, PR.AC-1 and user access reviews are a critical identity control for compliance and security audits. This
Regarding compliance mandates, the Sarbanes-Oxley Act (SOX) of 2002 is one of the most comprehensive and rigorous. This act was created in response to several