A&PMar 142 minCompliance vs. Actual Security Regulations serve a great purpose. They make sure folks are meeting a minimum standard. People want to know that if they disclose...
A&PMar 52 minPenetration Tests Vs. Risk Assessments The number one thing that everyone asks for when they come to us is a penetration test. They hand us external facing IP addresses and...
A&PMar 12 minChange ManagementThere are multiple security controls listed in cyber best practices related to change management. Yet, when I talk to people many times...
A&PJan 111 minSoftware SecurityWe all use software programs to accomplish various tasks. We've discussed in a past blog about conducting cyber evaluations before...
A&PDec 27, 20232 minOpen Source Intelligence (OSINT)There is tons and tons of information about us that we give away freely everyday. There is social media where we are openly sharing...
A&PDec 4, 20232 minSupply Chain- You are Only as Strong as Your Weakest LinkThere are many applications that do all kinds of amazing things available. Users always want the latest and greatest. Many organizations...