Blog
Insights into today’s security and compliance challenges
Articles
CISA Exploited Vulnerability Catalog Increases by 21%
‘That escalated quickly’ comes to mind when looking at the 95 new exploited vulnerabilities CISA added on March 3rd, then an additional 12 on March 7th. With these two additions, the known exploited vulnerability catalog increased by 21%. This represents a...
New HITRUST Assessment Options for Business Associates
HITRUST has rolled out several changes providing new assessment options for organizations to achieve various levels of assurance. Overall, there are three assessments, each helping organizations to evaluate and understand the effectiveness of their cyber preparedness...
Cybersecurity Talent Crisis Will Forever Change IT
Even before the ‘great resignation’ companies were struggling to find, and keep cybersecurity talent. Read about some strategies and solutions for addressing the persistent cybersecurity talent shortage.
Security and Compliance News
January 2022 The headaches for security and IT continue after December’s Log4J multiple patches. January security and compliance news include other wide-sweeping vulnerabilities that became known in addition to a vulnerability with McAfee’s security agent. Just a...
What are the Benefits of Penetration Testing?
The Gift of Penetration Testing Penetration testing is one of the best security investments a business can make. In-house IT or security lacks the objectivity to uncover and thoroughly test for the flaws that expose them to potential data breaches. Having an external...
Log4J Exploit Easily leads to Remote Code Execution
Log4J Remote Code Execution (RCE) Exploit has far-reaching implications as it is a highly popular open-source library. Learn what small to mid-sized enterprises can do about this today.