Building a Security Governance Program

Building a Security Governance Program

Security governance is the set of policies, procedures, and standards that an organization establishes to manage its cybersecurity risks. The compliance program ensures the confidentiality, integrity, and availability of its data and assets. To be successful, ensure...
Multi-Factor Authentication (MFA)

Multi-Factor Authentication (MFA)

Two Factor Authentication Did you know that you can prevent 99% of account attacks by using multi-factor authentication (MFA)? MFA also known as two factor authentication is one of the most important security measures you can take. 99.9% of account attacks are...
What is a vCISO?

What is a vCISO?

A virtual chief information security officer (vCISO) is a third-party cybersecurity expert who provides organizations with strategic advice and guidance on information security matters. Typically there are one of three reasons to hire a vCISO:  Your company’s...
Crypto Done Right

Crypto Done Right

By Debra Baker CryptoDoneRight is now a nonprofit and has found a home at the Cloud Security Alliance. Ever wonder what cryptographic algorithms to use?  What is better for symmetric encryption, AES-CTR or AES-CBC?  For that matter what is symmetric...
Vulnerabilities #1 Attack Vector

Vulnerabilities #1 Attack Vector

Kaspersky released a 2021 Incident Response report on threats. The latest data it has on initial compromise shows that unpatched vulnerabilities are the number one attack vector. What this means is attackers are exploiting unpatched vulnerabilities on internet-facing...