A look into what the SOC process was designed for and how to determine if it is something you need.

The Enterprise Standard in Cyber Defense
A look into what the SOC process was designed for and how to determine if it is something you need.
NIST CSF 2.0 brings new content to broaden its audience and new tools to help ease implementation. By Jeffrey T. Lemmermann, CPA, CISA, CITP, CEH In 2013, the National Institute of Standards...
Back in 1999, the Gramm-Leach-Bliley Act was passed in the United States. Its main purpose was to allow banks to offer services that previously were forbidden by laws passed even farther back in...
See the original publication found in On Balance Magazine. At some point in 2015, cybercriminals had an aha moment. Instead of going through all of the trouble of breaking into a network, stealing...
Risks and Considerations for IT: A Pandemic What can IT do to prepare? We all know the stats of the Coronavirus, although they are changing by the minute. We know what to do personally and for our...
Microsoft Secure Score. If you’re an IT administrator or security professional in an organization that uses Office 365, then you’ve no doubt used the tool or at least heard the term. It started as...
Are you using a framework to establish your information security program? If not, I get it; it’s complicated. On a second thought, have you lost your mind? I’ve been there. A number of years ago,...