Cybersecurity
Collection

Cyber resilience is an organization’s ability to detect, prevent, respond, recover and learn from cybersecurity disruptions. Our cybersecurity collection explores common issues, trends and what organizations must do to prepare proactive and reactive solutions to and keep your assets safe.

Featured Insights

Embracing DE&I Intersectionality: A Catalyst for More Effective Cyber Incident Response
At a glance
The big picture: The role of a cyber incident responder is more critical than ever as these professionals are tasked with protecting...

White House Issues Executive Order to “Seize the Promise and Manage the Risks” of AI
In this Flash Report, we summarize the key directives contained in the executive order, address key takeaways and concerns for organizations to...

New White House Cybersecurity Strategy Creates Additional Concerns for Businesses
The White House recently released a comprehensive national cybersecurity strategy that is sure to have a major impact on government agencies as well...

ISO 27001: 2022 - Key Changes and Approaches to Transition
This article will address the changes and updates to ISO 27001 standard published on October 25, 2022, and the approaches organizations can take to...
Managed Security Services

How Offloading Vulnerability Management Enhances Security
The obstacles cybersecurity organizations face may often seem insurmountable. From dealing with a competitive labor market, to the rapid pace at which...

A Guide to Pen Testing and Red Teaming: What to Know Now
Penetration testing and red teaming are essential cybersecurity practices that bolster an organization's security posture by uncovering...

Common Frameworks for Maturing Security Programs
Every cybersecurity organization, through its program maturity journey, grapples with the challenge of choosing and aligning with a security framework...
Data Protection

Unveiling the Power of Threat Hunting
In a world where headlines are dominated by the latest breach, organizations cannot afford to rely solely on reactive security measures, lest they...

Getting the Most From Tabletop Exercises, Part 2
In part one of this series, I introduced tabletop exercises as a critical component of business continuity and incident response planning, along with...

How Washington State Just Changed the Consumer Health Data Privacy Game
2023 is proving to be an interesting legislative year in the United States, as several individual states take on new legislation aimed at protecting...

Why Dark Web Monitoring Is Important Today
In today’s interconnected world, where adversaries seem to always be one step ahead, companies face an increasingly complex threat landscape. One of...
Security Resilience

Are SEC Charges Against SolarWinds and Its CISO Signaling a New Era of Personal Accountability?
In this Flash Report, we summarize the SEC’s allegations against SolarWinds and offer nine points for executives and functional leaders with SEC...

Using Cyber Risk Quantification to Manage Chaos
The most important use of any risk assessment tool is that it must contribute to better decision making on how to manage individual risks. Whether...

Funding Cyber Protection: A Closer Look at State and Local Grant Programs
Over the last few years, the Biden administration has heightened the awareness, requirements and activities associated with protecting the American...

Metrics’ Role in Cyber Transformation
We’ve all heard the saying, “what gets measured gets done,” meaning that regular measurement and reporting helps to keep organizations focused on the...
Security Architecture

Emerging Trends in IAM Part 4: Going Passwordless with the FIDO Use Case
The hybridization of the workforce and subsequent challenges within the IAM world has resulted in many organizations beginning (or reimagining) their...

Cybersecurity Risk Assessments vs. Gap Assessments: Why Both Matter
As cybersecurity incidents continue to make headlines, whether involving the breach of sensitive information or the halting of an enterprise’s...

A House Divided: Key Differences in Cybersecurity Implementation for IT and OT
Anyone who has spent a significant amount of time in any U.S. state where college football is popular, has likely seen a “house divided” bumper...

API Security: Key to Interoperability or Key to an Organization?
Most applications built today leverage Application Programming Interfaces (APIs), code that makes it possible for digital devices, applications and...