Syndicated Blog

Understanding The FTC Safeguards Rule

The FTC Safeguards Rule requires financial institutions to guarantee protection of sensitive customer data  The FTC Safeguards Rule mandates that “financial institutions” should create comprehensive information security frameworks that ensure the protection ...

The Urgency for Robust Utility Cybersecurity

The need for improved utility cybersecurity has never been more  critical   The utility industry, encompassing everything from water treatment facilities to nuclear power stations, represents the backbone of modern civilization. As ...

Debunking the Myths of Microsegmentation

What are the common myths behind microsegmentation, and is it actually as hard to achieve as some people say?  The history of network segmentation is a complicated one with a plethora of ...

Bridging the Gap as OT Networks Integrate with IT Environments

As OT networks integrate with IT environments, how can we bridge the gap to promote robust security?  The (sometimes intricate) lines between Operational Technology (OT) networks and Information Technology (IT) environments are ...

FIM Beyond Breaches: Compliance and Trust

More than just breach mitigation – File integrity monitoring (FIM) is trust and compliance  Every day, we see an ever-escalating array of cyber threats. As organizations race to safeguard their digital assets, ...

The Evolving Work of the CISO in 2024

The challenges, responsibilities, and the modern cybersecurity battlefield for CISOs in 2024  I speak to many cybersecurity professionals, and if there’s one ongoing and pervasive concern they all highlight about the nature ...

The Essential Eight Cybersecurity Framework: Meeting and Surpassing Standards

How can an organization meet and exceed the ASD Essential Eight cybersecurity framework standards? Cyber threats have become more sophisticated, frequent, and damaging, ensuring the cybersecurity of an organization’s digital assets is ...

Zero Trust Architecture: Beyond the Buzzword

Everyone’s heard of zero trust architecture, but why has it become best practice for enterprises around the globe? There’s no shortage of cybersecurity buzzwords. Among them, “zero trust” stands out not just ...

Navigating the Nuances of the Asia-Pacific PDPA

Fundamental obligations of the Asia-Pacific Personal Data Protection Act (PDPA) for cybersecurity teams In the information age, the significance of data cannot be overstated, and cybersecurity legislation and standards govern its usage ...

Where do Value Chain Attacks Come From?

Supply chain attacks and value-chain attacks, while not entirely new, have gained significant attention in recent years  With a surge in high-profile incidents like the SolarWinds Orion breach, a deeper understanding of ...