by Randall Laudermilk, Vice President of Product Strategy & Strategic Partners | Nov 25, 2024 | Vulnerability Management
Managing security risks in the cloud is no small feat. For many organizations, the agility offered by platforms like AWS has become both a blessing and a challenge. Technicians can spin up, modify, and delete instances with ease, thanks to Infrastructure as Code...
by Randall Laudermilk, Vice President of Product Strategy & Strategic Partners | Oct 28, 2024 | Vulnerability Management
Third-party vendor relationships are often seen as a sign of business growth, but they also open the door to significant cybersecurity risks. Every vendor you bring on board can become a potential entry point for cyber threats. As you grow your partnerships, you must...
by John Braden, Chief Cybersecurity Architect | Oct 16, 2024 | Compliance, Cybersecurity
With all the news about cyber espionage, organizations of all sizes are under even more pressure to maintain cybersecurity compliance. Increasing regulatory demands and progressively sophisticated threats mean that retail, healthcare, managed security, and virtually...
by Randall Laudermilk, Vice President of Product Strategy & Strategic Partners | Sep 30, 2024 | Uncategorized
On September 16, 2024, the The Cybersecurity and Infrastructure Security Agency (CISA) published the Federal Civilian Executive Branch (FCEB) Operational Cybersecurity Alignment (FOCAL) Plan today. As the operational lead for federal cybersecurity, CISA uses this...
by Randall Laudermilk, Vice President of Product Strategy & Strategic Partners | Sep 23, 2024 | Compliance, Cybersecurity, PCI Compliance, Security & Protection, Vulnerability Management
Cybersecurity risk management is a technical necessity and a strategic imperative. Cyber threats are continuously evolving and intensifying. Organizations must adopt the most robust strategies for protecting their assets, reputation, and bottom line. High-stakes...
by John Braden, Chief Cybersecurity Architect | Aug 5, 2024 | Attacks Breaches & Hacks, Cybersecurity
The recent global IT outage caused by a botched software update from CrowdStrike serves as a stark reminder of the vulnerabilities inherent in our interconnected world. As a competitor in the cybersecurity industry, it’s crucial to analyze this incident and...
by Randall Laudermilk, Vice President of Product Strategy & Strategic Partners | Jul 22, 2024 | Attacks Breaches & Hacks, Cybersecurity
Last month, a significant cyber espionage incident involving Chinese state-sponsored hackers came to light. This incident highlights severe vulnerabilities within a major enterprise’s security infrastructure. All breaches are scary. What makes this one...
by Randall Laudermilk, Vice President of Product Strategy & Strategic Partners | Jun 18, 2024 | Cybersecurity, Risk Assessment
Managing vulnerabilities in cybersecurity can feel overwhelming, especially with the increasing number of vulnerabilities and sophisticated threats. Traditional methods that treat all vulnerabilities the same just don’t cut it anymore. That’s where...
by John Braden, Chief Cybersecurity Architect | May 29, 2024 | Cybersecurity, Risk Assessment
As businesses increasingly rely on digital technologies, the need for robust cyber security measures has never been more pressing. Understanding and mitigating cyber risks through thorough risk assessments is critical to safeguarding your operations and data. We...
by Randall Laudermilk, Vice President of Product Strategy & Strategic Partners | Apr 25, 2024 | Cybersecurity
As Managed Security Service Providers (MSSPs) serving small retail and hospitality businesses, navigating compliance requirements like PCI-DSS and HIPAA can be a complex yet essential aspect of your operations. These regulations are designed to protect sensitive...