Zero Trust – Avoiding the Paranoid Posture of “Trust No One”

The approach for protecting our digital assets from cybercrime, fraud, and abuse has been coined by the cybersecurity industry as “Zero Trust” and even defined as an architecture approach by NIST 800-207. At first glance, it appears that the pendulum on managing digital threats seems to have turned towards an almost paranoid response: “Trust No […]

FedRAMP vs. CMMC Compliance Questions

Depending on your circumstances, your business must comply with various regulations to sell to the US government. Achieving compliance for Federal contracts can be tricky, and understanding the government acronyms all the more confusing. In previous posts, we have discussed what FedRAMP and CMMC are, and how to obtain certification. Today, we’ll dive into the […]

Cybersecurity Strategy and Roadmaps: Creating a Secure Foundation for the Future

Cybersecurity Strategy and Roadmaps: Creating a Secure Foundation for the Future In today’s digital age, cybersecurity is critical to any business operation. It’s not a question of whether a company will face a cyber attack but when it will happen. Companies need to adopt a proactive approach towards cybersecurity to ensure that their assets are […]

Florida’s H.B. 473 Cybersecurity Incident Liability Act

Cybersecurity, Incident Response, and Liability: Florida’s H. B. 473 Cybersecurity is a complex and dynamic field where new threats emerge daily, often outpacing traditional security measures. For Businesses, data breaches can have severe consequences, which include financial losses, reputational damage, and legal liabilities. When sensitive information, such as personal data or financial records, is compromised, […]

Are You Maximizing Your IAM Investment? 

By Sandhya Sukumar  In this era of evolving cyber threats, strengthening the IAM space is the top security goal for every organization. When IT leaders contemplate IAM solutions, their primary concern is alignment – ensuring that the IAM strategy not only addresses current cyber threats but also seamlessly aligns with compliance goals, budget constraints, and […]

Building Cyber Resilience: Part II

By Sandhya Sukumar  In the first article on this topic we discussed the why, the what, and the importance of Cyber Resilience, including its challenges. In this article, let’s take a look at some of the components involved when building a Cyber Resilience strategy:  A holistic cyber resilience strategy encompasses cybersecurity measures across all levels […]

Building Cyber Resilience

By Sandhya Sukumar  Organization leaders worldwide are increasingly aware that one single cybersecurity solution does not exist to tackle today’s sophisticated and rapidly evolving cybercrimes. Even with strengthened defenses, threat actors can find weaknesses and vulnerabilities to infiltrate a company’s network and IT Infrastructure. Moreover, modern IT infrastructures are complex, interconnected ecosystems involving multiple organizations […]

What’s the Big Idea: Identity Management Projects that Deliver

What’s the Big Idea: Identity Management Projects that Deliver   By Hanno Ekdahl In the intricate tapestry of modern business, Identity Management (IDM) emerges as a critical thread, weaving together security, efficiency, and user experience. Identity management projects are not mere technical endeavors; they are strategic initiatives that demand a harmonious blend of design, technology, and […]

The Importance of Multiple IT Environments

By Richard Hawes Very early in my IT career, I learned that, as a matter of general best practice, companies almost always have at least two environments for critical systems and usually three for application development and management. Some companies, depending on their complexity and needs, have more than that. This is to enable the […]

Hidden Dangers: Why Your Organization’s Cybersecurity Posture is Delusional

In today’s digital world, organizations rely on technology to conduct their operations efficiently. However, this rapid digital transformation has also opened up new avenues for cyber threats. While many organizations invest in cybersecurity measures, there is a pervasive overconfidence about the maturity of their actual cybersecurity posture. In this blog, we will shed light on […]