BLOG

Your trusted source for cybersecurity news, insights, and advice.

Tips for Developing or Improving Metrics

Tips for Developing or Improving Metrics

Reposted Content from ISACA Newsletter @ISACA Volume 1 Everywhere we turn, vast amounts of facts, figures, numbers, records and files are being processed, interpreted, organized, structured and presented in a way that turns those data bits and bytes into meaningful...

The One Thing your Utility Security Program is Missing

The One Thing your Utility Security Program is Missing

Ever since the Federal Energy Regulatory Commission approved mandatory cybersecurity standards for the nation’s grid, self-proclaimed gurus and experts have been making a headache of things. The Critical Infrastructure Protection (CIP) standards are one of the few...

Understanding the Impact of the KRACK Attack

Understanding the Impact of the KRACK Attack

I am writing to give you the skinny on KRACK, the attack, and to provide some of the “facts” along with some recommendations for what to do now. The bottom line is that your devices ARE vulnerable to this newly discovered attack. Practically every WiFi enabled device...

Tips for Understanding the Role of RCSA in Risk Management

Tips for Understanding the Role of RCSA in Risk Management

Organizations exist to produce a product or deliver a service and generally have a strategy or a set of goals. Risk management is an organizational discipline that, when combined with strategic planning, ensures that the risk with the greatest potential negative...