
Attestation Is the Solution to the Solution
Great message by US Cybersecurity and Infrastructure Security Agency Director Jen Easterly. In an address to Carnegie Mellon University, she warned that Chinese hackers are
Great message by US Cybersecurity and Infrastructure Security Agency Director Jen Easterly. In an address to Carnegie Mellon University, she warned that Chinese hackers are
The news often brings to us word on breaches and hacks – in a usually nicely capsulated package of forensic data concerning the attack vector,
Azure AD is the dominant identity store for enterprises under compliance: SOX, SOC2, HIPAA/HITRUST, ISO 27001 and others – and thus the need for access
Organizations face many cybersecurity threats, both internal and external. When it comes to maintaining the integrity of sensitive information, organizations must take every possible precaution
In 2021, we saw the end of the era of identity theft and the beginning of the next: the era of identity fraud. According to
One can not avoid the slew or reports of the hacks – from Colonial Pipeline to the all the victims known and unknown from the
Nothing is more important than conducting proper audits to ensure an organization’s data security and compliance. However, conducting effective audits is easier said than done
What is User Access Control? User Access control is at the heart of cybersecurity and it is integrated into our everyday life. User access control regulates who has what access, and when they
DODs CMMC (Cyber Security Model Certification) Levels, What are they? This blog will denote the differences in the DODs CMMC (Cyber Security Model Certification) Levels. In response
An odd blog for a founder and CEO of a compliance company – but there it is. We all know that hacking is at an