As we come to the end of our series, we are rounding out the second half of our top 10 most popular uses of artificial intelligence in cybersecurity...
Sign up to receive our newsletter and stay up-to-date on industry news, events, our latest articles, and staffing/recruiting opportunities!
Elevate Insights
AI in Cybersecurity – Benefits, Risks, and Mitigation
Continuing our series on AI in Cybersecurity – let’s take a look at a few of the most popular uses of Artificial Intelligence for protecting digital...
Taking the Plunge – What You Should Know Before Implementing AI into Your Cybersecurity Practices
If your company handles a significant amount of data, chances are that using AI (Artificial Intelligence) for cybersecurity is an inevitable future....
AI in Cybersecurity
Artificial intelligence (AI), while not a new phenomena, has become one of the hottest topics in the world over the past couple of months since the...
Knowbe4’s Seven Core Dimensions of Security Culture
In case you haven’t heard it enough, businesses need to be proactive when it comes to security! A single security breach can result in significant...
April 10th is Global Work from Home Day – How is it Really Going?
It’s been three years since the world of office life was forever changed. Businesses clamored to comply with new public health policies without...
Empower Your First Line of Defense – Training Employees in Cybersecurity
If your organization deals with sensitive information on a regular basis, you most likely have varying levels of digital security on your radar at...
The StateRAMP Review Process
Founded in 2020, the State Risk and Authorization Management Program (StateRAMP) is a program that aims to help state and local governments in the...
Ethical Hacking – The Unsung Hero of Cybersecurity
The word “hacking” has long had a negative connotation, generally being used in the context of security breaches involving people with malicious...
US Launches New National Cybersecurity Strategy
In 2018 the Department of Homeland Security released a 5-year strategy to provide a framework to execute their cybersecurity responsibilities. The...
What is an Upstream EDE Entity?
There are three categories for an upstream EDE Entity: White-Label Issuers Hybrid Issuers Hybrid Non-Issuers For all upstream arrangements, the...
Combining FedLine Security Controls and SWIFT CSP Efforts
Let's break down the benefits of combining FedLine and SWIFT CSP FedLine Security Controls - is an Assurance Program that has become the standard...
What’s New with ISO 27001:2022
In 2013, the International Organization for Standardization (ISO) released a revised 27001 framework outlining best practices to help organizations...
What is CMS DE and EDE Pathway?
Direct Enrollment (DE) permits consumers to purchase a Marketplace health plan from a source other than Healthcare.gov; however, the process was...
Addressing the Threat – Cybersecurity Staffing and Recruiting Challenges in 2023
It has been no secret that the Cybersecurity workforce is facing a significant talent shortage. Whether due to natural lack of interest, decrease in...
OWASP Top 10
It might not have made Letterman’s list, but that doesn’t mean it's not important! The OWASP Top 10 provides rankings for the most critical web app...
Code, Compliance, and CISO’s. Shifts in the Cybersecurity Landscape Amid New NYDFS Regulation Changes.
On November 9, 2022 the NYDFS announced major revisions to their existing laws with regards to cybersecurity and reporting. Recent updates to...
FedRAMP Authorization Act Signed by President Biden
On Wednesday January 11th, FedRAMP was excited to announce that the FedRAMP Authorization Act has been signed by President Biden as a part of the...
What, How and Why of Web App Penetration Testing
As the digital world continues to rapidly expand, organizations must be increasingly aware of the potential risks associated with their web...
IoT and OT: The Good, The Bad, and The Frameworks
With the flurry of excitement that comes with the introduction of Smart technology, it is easy to overlook all of the new cyber threat opportunities...
Protect Your Business: The 6 Steps of Wireless PenTesting
Wireless PenTesting is the act of searching and exploiting weaknesses on a WiFi network with the purpose of gaining access to the network or lateral...