people process technology

Cloud Identity Defenses – Cybersecurity and The Cloud

When operating in the cloud environment, traditional IT security practices must be reimagined, as legacy controls such as firewalls and network security perimeters are inefficient in securing resources that reside in the cloud. Moreover, due to cloud configurations regarding data access, usage, and storage, too many variables are introduced which makes it impossible for traditional […]

Cloud Identity Defenses – Cybersecurity and The Cloud Read More »

The Secret of Successful Vulnerability Management Programs

In the complex world of cybersecurity, a formal vulnerability management program is increasingly used to identify, communicate, and remediate key vulnerabilities across a wide range of facilities from office complexes to manufacturing plants. Vulnerability management is an old concept with a lot of understanding in a high-level capacity, but the execution of a full program

The Secret of Successful Vulnerability Management Programs Read More »

A Fresh Approach to Cybersecurity, Part 4

Technology is a third rail because the implementation of technology is by far the easiest thing to mess up for any organization and no one wants to talk about it. This is the last installment of the four-part “What is Cybersecurity?” series. While no ground-breaking truths have been uncovered, we’ve presented information that is necessary for leadership and

A Fresh Approach to Cybersecurity, Part 4 Read More »

A Fresh Approach to Cybersecurity, Part 3

This series, What is Cybersecurity?, outlines the basic tenets of how the three areas of the cybersecurity triangle may be implemented by an organization. The cybersecurity triangle (people, process, technology) has been the focus of the series, as it provides an easy, understandable framework for discussing what comprises cybersecurity and the areas of concentration to

A Fresh Approach to Cybersecurity, Part 3 Read More »

A Fresh Approach to Cybersecurity, Part 2

This four-part What is Cybersecurity? series discusses the impact of cybersecurity to an organization and the three approaches which must be addressed to achieve cybersecurity nirvana. Yet cybersecurity nirvana is truly never attainable due to the always evolving nature of cybersecurity. The evolution of cybersecurity is directly attributable to one area: people. In the first part

A Fresh Approach to Cybersecurity, Part 2 Read More »

A Fresh Approach to Cybersecurity, Part 1

This is the first installment of a four-part series on the equal nature approach to cybersecurity.  “If you think technology can solve your security problems, then you don’t understand the problems and you don’t understand the technology.” ~Bruce Schneier What is Cybersecurity? The answer to “What is Cybersecurity?” changes every couple of years based on

A Fresh Approach to Cybersecurity, Part 1 Read More »

Scroll to Top