Category: Analysis and Assessments

seal of the U.S. department of the treasury on building exterior

Advisory on Facilitating Ransomware Payments

Facilitating a ransomware payment enables criminals to profit from their illicit activities and could violate OFAC regulations.

Business leader takes charge of cyber security.

The Importance Of Cyber Security In Business

Responsibilities have moved to the board room because data breach factors that impact your bottom line are not limited to revenue loss, damage to reputation, or loss of Intellectual Property.

Business leader looks at a wall of gears.

5 Mistakes Executives Make Delegating Security To MSPs

MSPs claim to provide effective data security, so you delegate. You cannot relinquish responsibility and must inspect the work they perform. Trusting cybersecurity to your MSP is prone to problems that lead to disastrous results.

Cybersecurity professional conducts a blue team assessment.

What Are Blue Teams and Blue Team Exercises?

Blue teams are responsible for monitoring, detecting, and reacting to security threats. Click here to learn more about blue teams.

Business leader conducts a red team exercise.

What Are Red Teams and Why Conduct Exercises?

Valuable and objective insights about the existence of vulnerabilities, efficacy of defenses, and mitigating controls for the U.S. manufacturing industry. Click here to learn more about Red teams.

Supply chain professional creates a flow map.

How Third-Party Risks Impact the Supply Chain

A systematic approach to third-party risk management is needed for more effective supply chain management. Click here to learn more about third-party risk.

Supply chain professional interacts with a digital display.

15 Misconceptions About Supply Chain Cybersecurity

Comments or concerns regarding cybersecurity can often be myths or misconceptions. This article explains why inaccurate conclusions and misconceptions about cybersecurity are common contributors to disruption within supply chains.

Capital building.

Cybersecurity Maturity Model Certification (aka CMMC)

CMMC aims to become a verification mechanism for protecting Controlled Unclassified Information (CUI) and establishing cybersecurity controls on Defense Industrial Base (DIB).