There is no such thing as an ironclad cybersecurity system. Even the most well-designed programs are subject to technology shifts, system failures, and good old-fashioned human error. Unauthorized access, weak... Read More
Blog
Risk Mitigation in Software Engineering
The OWASP Software Assurance Maturity Model (SAMM) guides you through the software development life cycle (SDLC) so that you can create secure applications.
Read MoreManaging Third Party Risks When Using Cloud Storage
In today's fast-paced world, organizations (and individuals) benefit from relying on third parties to manage their business processes. From cost reduction to speeding up production times, cloud-based services offer commercial... Read More
Best Practices to Mitigate Cyber Risks in 2021
Anyone following cybersecurity news has likely heard about the infamous Colonial pipeline ransomware attack in May 2021. A compromised password allowed hackers to gain access to the company’s network and... Read More
The CISA’s New List of Bad Practices for Cybersecurity Risk
The Cybersecurity & Infrastructure Security Agency (CISA) is a U.S. government agency focused on risk management for the nation's infrastructure protection. Its mission is to guide national efforts to understand... Read More