Driving Security Initiatives So You Don't Have To

Audits VS Assessments And Why They Are Not The Same Thing

Audits VS Assessments And Why They Are Not The Same Thing

Audits vs. Assessments & why they’re not the same thing  It’s much easier to mitigate a risk when you know the risk exists.  Using the analogy of a snake in the grass, people don’t go running off into the woods by a creek without surveying the ground at their feet.  Likewise, maintaining a blindness to risk is aRead more about Audits VS Assessments And Why They Are Not The Same Thing[…]

Vulnerability Management Programs

Vulnerability Management Programs

Vulnerability Management Programs  Vulnerabilities exist in all systems, and these vulnerabilities are what attackers take advantage of to steal credentials, perform Denial of Service attacks, exfiltrate sensitive data, and more.  A major component of a successful Security Program is a Vulnerability Management Program that can respond rapidly to known vulnerabilities, closing these gaps as quickly and asRead more about Vulnerability Management Programs[…]

What is a Chief Information Security Officer?

What is a Chief Information Security Officer?

The title “Chief Information Security Officer” (CISO) is viewed in various ways by different people and different organizations.  In some organizations, the CISO carries a purely policy-focused role.  Others, the CISO role can overlap or even envelop IT and business operations.   The role answers to different levels in different organizations, often being strictly associated with IT. Read more about What is a Chief Information Security Officer?[…]