by John Bruggeman | Nov 15, 2022 | Security
Tech bills before America’s Congress, NIST announces quantum cryptography algorithms, and Lockdown mode is coming to Apple iOS 16 Three recent developments in security technologies have created ripples in the IT world with effects that could be felt well into...
by Ryan Hamrick | Oct 24, 2022 | Security
The SBOM is an essential tool in cyber defense and compliance management What is a Software Bill of Materials? A bill of materials (BOM) is a concept from physical supply chains. In essence, it’s a receipt on steroids. A BOM lists identifying information about...
by John Bruggeman | Oct 21, 2022 | Security
How concepts from the CIA Triad affect personal information Information security and information privacy defined While it may be easy to conflate the two, information privacy is not the same as information security. For information security professionals, the...
by Justin Hall | May 31, 2022 | Security
Happy summer, everyone! To celebrate, there’s a new Microsoft Windows zero-day vulnerability, currently classified by NVD as CVE-2022-30190, and nicknamed by the community as Follina. It exploits a flaw in the Microsoft Support Diagnostic Tool (MSDT) that uses the...
by John Bruggeman | Feb 2, 2022 | Security
Your brain is constantly working to detect threats to your safety–whether you realize it or not. When visiting an unfamiliar place, your senses take in stimuli, which your brain uses to protect you. For enterprises, defensive cybersecurity systems have the same goal....
by John Bruggeman | Dec 17, 2021 | Security
So far in this cybersecurity framework series, we’ve covered NIST CSF and ITSG-33 frameworks and CIS Controls as options for organizations to secure their IT environment. In this blog, we’ll peek behind the enemy lines of cyber crime by exploring the MITRE ATT&CK...