Apr 3, 2023CYBERSECURITY GUIDESWhy you need a Data Inventory to secure your companyOne of the most obvious but undervalued ways to improve data protection is by properly managing it. This starts with a thorough inventory.
Nov 19, 2022CYBERSECURITY GRCOverview of Cybersecurity FrameworksCybersecurity frameworks are created to help organizations across different industries follow best practices to secure their systems.
Oct 7, 2022CYBERSECURITY GRCCybersecurity Control Review - Account Management, CIS 5CIS Control 05 covers Account Management which focuses on managing account credentials and authentication, including a password policy.
Sep 20, 2022CYBERSECURITY GUIDESCybersecurity Incident Response Guide, Part 1The goal of Incident Response is to identify threats, respond quickly before the threat spreads, and remediate before they cause damage.
Sep 5, 2022CYBERSECURITY GRCIntegrating Application Security Practices, Part 1Security is critical to the software development process. There are many frameworks, such as OWASP, that should be leveraged for this.