How to Implement a Data Governance Strategy

by KirkpatrickPrice / May 4, 2023

It’s almost a clichĂ© to point out that data is an asset and should be managed accordingly. We all know data has value and that, when correctly leveraged, it helps businesses to optimize operations ranging from human resources to manufacturing to marketing. Recent advances in data science and machine learning have made data even more valuable. But the phrase “data is an asset” misses a vital detail. Data is an…

The Top 5 AWS Security Mistakes To Avoid

by Hannah Grace Holladay / April 12, 2023

AWS’s compute and data storage services are the beating heart of tens of thousands of businesses. That makes AWS security and compliance a matter of critical concern. It’s all too easy to make a configuration mistake that opens the door to bad actors intent on stealing data and infiltrating malware. For example, estimates put the proportion of misconfigured buckets on Amazon’s Simple Storage Service (S3) at 46%. In this article,…

The Impact of NIST Revision 5 on Cyber Threat Simulation

by Amelia Lewis / June 14, 2023

What’s New With NIST 800-53 and Penetration Testing? In September of 2020, NIST released Revision 5 to SP 800-53. Now, a year later, the changes will take effect on September 23. A common theme throughout this new revision is real-world simulation becoming an expected cybersecurity best practice for U.S. federal government agencies and contractors. The world of technology and cybersecurity is rapidly evolving. With new tactics and techniques uncovered every…

Ask the Expert: Penetration Testing

by Sarah Harvey / February 20, 2023

Penetration Testing for HIPAA Compliance Penetration testing is a critical line of defense when protecting your organization’s sensitive assets - especially Electronic Protected Health Information (ePHI). Penetration testing is the process of performing authorized security testing of an environment to identify and exploit weaknesses associated with the targeted systems, networks, and applications before those weaknesses can be exploited by a real attacker. When performed in support of HIPAA compliance, the…

How Can Penetration Testing Protect Your Assets?

by Sarah Harvey / January 25, 2023

Every business has something to lose. But…who loses sleep over it? Whose job is on the line if assets are compromised? Who cares about protecting their assets? In recent data breaches, some companies just haven’t shown the expected response when they compromise assets. Take Uber, for example. The core of Uber’s business is drivers and riders, yet they covered up a hack for over a year. Hackers stole 57 million…