Policy and Procedure

April 3, 2020
A CISO’s Guide to Secure Remote Work

How to Ensure security while your Workforce is Remote Due to the recent COVID-19 outbreak, many people are now working from home for the first...

Read More
June 10, 2018
Inherent Risk Tiering for Third-Party Vendor Assessments

It can be a challenging and overwhelming task to adequately manage the risk associated with outsourcing technology or business processes,...

Read More
November 24, 2016
Stop By Booth 118 @ AWS re:Invent and Speak to Our Team of Cybersecurity Experts

Read More
October 6, 2016
BCDR Series: The intersection of Incident Response and Business Continuity

When most people think of Continuity, they think of bringing a business back online after a fire or a flood....

Read More
August 5, 2016
Hacking Hillary: Recent Breaches against Democratic Political Groups

A recent leak of thousands of Democratic National Committee emails cast a long shadow over the Democratic Convention in Philadelphia...

Read More
March 14, 2016
Electronic Voting for the 21st Century

With the election year ahead it behooves us to take a look at the security of our voting systems and...

Read More
October 15, 2015
Privilege Escalation via Group Policy Preferences (GPP)

While this is not a new topic in the penetration testing world by any means [Chris Gates (@carnal0wnage) and others...

Read More
February 22, 2011
Wikileaks: How I Learned to Worry More…

Wired’s Danger Room blog recently acquired a “Cyber Control Order” penned by Major General Richard Webber, commander of Air Force...

Read More
September 25, 2010
A Requirement By Any Other Name….

Since we’ve covered FISMA and NIST recently, I thought it would be a good time to discuss policies, standards, guidelines,...

Read More