Navigating the Changes in NIST SP 800-171 Rev. 3 – What You Need to Know

Navigating the Changes in NIST SP 800-171 Rev. 3 – What You Need to Know By Sajid Shafique With new threats emerging almost daily, keeping ...
Read More →

How Not to Get Quished When Hungry!

How Not to Get Quished When Hungry! By Sandhya Sukumar Why QR Codes for Quishing? Quishing represents a sophisticated evolution of phishing, and its stealthy ...
Read More →

The Good, The Bad, The Agile

The Good, The Bad, and The Agile Agile methodologies have become increasingly popular as businesses have sought to develop software more quickly and efficiently. Agile ...
Read More →

Unprepared and Vulnerable: Understanding Disaster Recovery Planning, Risks, DRaaS, and the Benefits of In-House Solutions

Unprepared and Vulnerable: Understanding Disaster Recovery Planning, Risks, DRaaS, and the Benefits of In-House Solutions   By Sandhya Sukumar    Along with the risks of ...
Read More →

Building a Culture of Cybersecurity with Strategies for Training and Awareness

Building a Culture of Cybersecurity: Strategies for Training and Awareness Written by TJ Rubeck In today’s rapidly evolving threat landscape, employees are often considered the ...
Read More →

Are You Maximizing Your IAM Investment? 

By Sandhya Sukumar  In this era of evolving cyber threats, strengthening the IAM space is the top security goal for every organization. When IT leaders ...
Read More →
Scroll to Top