Understanding The FTC Safeguards Rule
Nik Hewitt | | advice, application protection, Best Practices, Cybersecurity, lateral movement, microsegmentation, next gen security, security, Security Research, zero trust
The FTC Safeguards Rule requires financial institutions to guarantee protection of sensitive customer data The FTC Safeguards Rule mandates that “financial institutions” should create comprehensive information security frameworks that ensure the protection ...
The Urgency for Robust Utility Cybersecurity
Nik Hewitt | | advice, analysis, application protection, applications, Best Practices, Cybersecurity, microsegmentation, next gen security, security, Security Research, service account protection, zero trust
The need for improved utility cybersecurity has never been more critical The utility industry, encompassing everything from water treatment facilities to nuclear power stations, represents the backbone of modern civilization. As ...
Debunking the Myths of Microsegmentation
Nik Hewitt | | advice, application protection, application-centric, Best Practices, Cybersecurity, lateral movement, microsegmentation, next gen security, Platform News, service account protection, zero trust
What are the common myths behind microsegmentation, and is it actually as hard to achieve as some people say? The history of network segmentation is a complicated one with a plethora of ...
Bridging the Gap as OT Networks Integrate with IT Environments
As OT networks integrate with IT environments, how can we bridge the gap to promote robust security? The (sometimes intricate) lines between Operational Technology (OT) networks and Information Technology (IT) environments are ...
FIM Beyond Breaches: Compliance and Trust
Nik Hewitt | | advice, application protection, Best Practices, Cybersecurity, File Integrity Monitoring, FIM, next gen security, security, Security Research
More than just breach mitigation – File integrity monitoring (FIM) is trust and compliance Every day, we see an ever-escalating array of cyber threats. As organizations race to safeguard their digital assets, ...
The Evolving Work of the CISO in 2024
Nik Hewitt | | advice, Best Practices, Cybersecurity, microsegmentation, next gen security, security, Security Research, TrueFort, zero trust
The challenges, responsibilities, and the modern cybersecurity battlefield for CISOs in 2024 I speak to many cybersecurity professionals, and if there’s one ongoing and pervasive concern they all highlight about the nature ...
The Essential Eight Cybersecurity Framework: Meeting and Surpassing Standards
Nik Hewitt | | advice, application protection, Best Practices, Cybersecurity, next gen security, security, Security Research, TrueFort, zero trust
How can an organization meet and exceed the ASD Essential Eight cybersecurity framework standards? Cyber threats have become more sophisticated, frequent, and damaging, ensuring the cybersecurity of an organization’s digital assets is ...
Zero Trust Architecture: Beyond the Buzzword
Everyone’s heard of zero trust architecture, but why has it become best practice for enterprises around the globe? There’s no shortage of cybersecurity buzzwords. Among them, “zero trust” stands out not just ...
Navigating the Nuances of the Asia-Pacific PDPA
Nik Hewitt | | advice, application protection, Best Practices, lateral movement, microsegmentation, next gen security, Security Research, zero trust
Fundamental obligations of the Asia-Pacific Personal Data Protection Act (PDPA) for cybersecurity teams In the information age, the significance of data cannot be overstated, and cybersecurity legislation and standards govern its usage ...
Where do Value Chain Attacks Come From?
Nik Hewitt | | advice, Best Practices, Cybersecurity, microsegmentation, next gen security, security, Security Research, Supply Chain Attacks, TrueFort, zero trust
Supply chain attacks and value-chain attacks, while not entirely new, have gained significant attention in recent years With a surge in high-profile incidents like the SolarWinds Orion breach, a deeper understanding of ...