Cybersecurity technology

What is the Magic Number? The Optimal Frequency for Pen Testing and Vulnerability Scans

What’s the Magic Number? The Optimal Frequency of Penetration Tests & Vulnerability Scans   This is the million dollar question of security professionals year after year: How often should one perform Pen Tests and Vuln Scans for their organization? While there is no right or wrong answer, and each organization has its own unique security

What is the Magic Number? The Optimal Frequency for Pen Testing and Vulnerability Scans Read More »

What is Cybersecurity Maturity Model Certification (CMMC)?

First: The Definition of a Maturity Model. Okay, before we jump into CMMC, it’s important to understand what a maturity model is… which is a tool to measure the ability of an organization to continuously improve in a particular discipline. Organizations use these frameworks as a baseline to gauge their current state in a specific

What is Cybersecurity Maturity Model Certification (CMMC)? Read More »

Identity and Orchestration, New Cybersecurity Amendments in New York, and More

We’ve said it before and we’ll say it again – cybersecurity is made up of all the different people who use it, and sometimes even those who abuse it. This week we want to again highlight the role that insider threats can play on your organization’s cybersecurity. While the ransomware trend overall seems to be

Identity and Orchestration, New Cybersecurity Amendments in New York, and More Read More »

Cybersecurity Requirements for Medical Devices Remain Unchanged, Rural Healthcare In Flux, and More

With the changing of the seasons, it can be all too easy to forget your cybersecurity plans in the influx of cold, flu, and seasonal allergy patients. However, it’s important all year long to keep your cybersecurity plans up to date and ready to deploy at the drop of a hat (and hopefully not at

Cybersecurity Requirements for Medical Devices Remain Unchanged, Rural Healthcare In Flux, and More Read More »

FedRAMP: What Is It, and How Can It Benefit You?

In the past, we discussed NIST SP 800-171, but what about securing cloud-based products and services? Let’s dig deeper. Prior to FedRAMP, each agency had to establish its own security standards and dedicate specialized resources. This would make things more complicated and make security across agencies a nightmare. Many agencies lack the funding necessary to

FedRAMP: What Is It, and How Can It Benefit You? Read More »

New Federal Reporting Requirements, California’s Privacy Rules Trickling Down and More

  Thanks, as always, for checking out our biweekly digest of articles for Identity Management Professionals. Click here to view the healthcare-focused digest. Peruse our resources for webinars, case studies, infographics, and educational videos. Subscribe to our Identity Management biweekly and/or our Healthcare Cybersecurity and IAM digest, delivered biweekly on Tuesdays at 8PM ET. New Federal Reporting Requirements Demand Timely and Accurate Cyber-intelligence via

New Federal Reporting Requirements, California’s Privacy Rules Trickling Down and More Read More »

Scroll to Top