Widgetized Section

Go to Admin » Appearance » Widgets » and move Gabfire Widget: Social into that MastheadOverlay zone

Home » Archives by category » Internet Security

Catch Configuration Drift with Regular Configuration Assessment

Catch Configuration Drift with Regular Configuration Assessment

Hardening an environment starts with the good intention of solid cybersecurity. System hardening is the process of applying configuration settings that are recognized to minimize the system’s vulnerabilities to cyber…

How Security Controls Can Improve Your Cybersecurity Posture

How Security Controls Can Improve Your Cybersecurity Posture

By Sean Atkinson, Chief Information Security Officer, CIS® Security is a journey, not a destination. It is important to understand that as security and IT introduce critical configurations and security…

Keep Your Employees Interested in Cybersecurity Awareness Training with these Tips

Keep Your Employees Interested in Cybersecurity Awareness Training with these Tips

By Sean Atkinson, Chief Information Security Officer As organizations work to make internal company processes and personnel more secure it’s worth asking, “Are we doing enough?” Rehashing an annual awareness…

Top 10 Malware April 2018

Top 10 Malware April 2018

April saw decreases across the board in notifications, driven by a significant decrease in Emotet, as well as drops in Redyms and TinyLoader. This led to a 23% decrease in…

Your GDPR Questions Answered

Your GDPR Questions Answered

The General Data Protection Regulation (GDPR) aims primarily to give control back to EU citizens and residents over their personal data while standardizing the regulatory environment of international business. It…

The Fox and the Hedgehog: Strategic Cybersecurity Response Planning

The Fox and the Hedgehog: Strategic Cybersecurity Response Planning

Let’s build on the harmonized combination of an organization’s risk manager and control framework described in my last blog post. Risk managers can use security controls to implement processes to…

Creating Event Trees to Help Measure Control Effectiveness

Creating Event Trees to Help Measure Control Effectiveness

By Sean Atkinson, Chief Information Security Officer The transformation of a fault tree In an earlier blog post, I described using fault trees as a process to understand and attribute…

GDPR – Are you ready?

GDPR – Are you ready?

New regulations like GDPR (General Data Protection Regulation) can always be a bit intimidating – but they don’t have to be! If your organization handles the personal data of EU…

Fault Trees and Risk Forests

Fault Trees and Risk Forests

 By Sean Atkinson, Chief Information Security Officer Risk management and the elicitation of scenarios Over the past few blog posts I have discussed and reviewed strategies for contingency, governance structures,…

Cloud Compliance – How to Stay Secure on an Intangible Infrastructure

Cloud Compliance – How to Stay Secure on an Intangible Infrastructure

By Sean Atkinson, Chief Information Security Officer “If it is not my device, how do I control it?” Security in the cloud can be a contentious topic. It has been…

Page 1 of 512345