What is a Secure Software Development Life Cycle

by Sarah Harvey / June 14, 2023

Have you ever worked on a project without a clear direction or guidelines? It can be stressful and pointlessly chaotic. Without structure and task lists, what could have been a basic project turns into a mess of miscommunication. The same principle applies to software development management. In an age when software development is a core function of most organizations, specific and detailed processes need to be in place to ensure…

How Your Org Chart Can Reflect a Culture of Cybersecurity at Work

by Sarah Harvey / June 14, 2023

The Need for a Culture of Cybersecurity at Work According to IBM Security’s 2019 Cost of a Data Breach report, “The average total cost of a data breach in the U.S. has grown from $3.54 million in 2006 to $8.19 million in 2019, a 130 percent increase over 14 years.” What does this mean for organizations looking to prevent data breaches and security incidents? It means that in order for…

Man working on computer

How to Build an IT Asset Management Plan

by Sarah Harvey / June 14, 2023

How you can best manage your data and assets in a time where information security threats are everywhere? What is asset management and where do you start with it? Let's start with a basic definition. Asset management is properly defining and categorizing an organization’s assets. A well-developed asset management plan can help you make strategic moves to increase your organizational security. With any plan for IT asset management in place,…

Update on the Citrix Vulnerability, CVE-2019-19781

by Sarah Harvey / December 15, 2022

On December 17, 2019, Citrix released information about a vulnerability tracked as CVE-2019-19781. This vulnerability lies in Citrix Application Delivery Controller (ADC), formerly known as NetScaler ADC, and Citrix Gateway, formerly known as NetScaler Gateway. Will this the Citrix vulnerability impact your organization? What We Know About CVE-2019-19781 CVE-2019-19781 allows unauthenticated remote attackers to execute arbitrary code on the exposed system. Because of where the Citrix vulnerability resides on the…

Fact or Fiction: Everything You Need to Know about Leading Compliance Initiatives

by Sarah Harvey / February 20, 2023

Why is Compliance is a Top 3 Initiative? It’s no secret that the cyber threat landscape is evolving at an alarming rate. Now more than ever, businesses must implement compliance initiatives to avoid the growing threats of a cyberattack in the new decade. As a leader of your organization, it’s your responsibility to see this through. In this webinar, you’ll learn from KirkpatrickPrice President, Joseph Kirkpatrick, about everything you need…