Building and Enhancing OT/ICS Security Programs Through Governance, Risk, and Compliance (GRC)

Building and Enhancing OT/ICS Security Programs Through Governance, Risk, and Compliance (GRC)

Operational Technology (OT) and Industrial Control Systems (ICS) are critical components of many industries, especially those within the 16 critical […] ...
NIST CSF 2.0 Is Here: How Will You Adapt?

NIST CSF 2.0 Is Here: How Will You Adapt?

The new NIST Cybersecurity Framework (CSF) 2.0 framework comes with multiple important and long-awaited updates. It won’t be easy to […] ...

The Critical Role of Governance, Risk Management, and Compliance in Operational Technology (OT) in Critical Infrastructure Organizations

As the industrial sector rapidly evolves through Industry 4.0, integrating digital technologies into operational environments becomes increasingly complex. For C-level […] ...

CMMC On Fast Track to Becoming Law

What is the latest? The Cybersecurity Maturity Model Certification (CMMC) 2.0 Proposed Rule, 32 CFR 170, was announced on December […] ...

PCI, CASB, CNAPP, and Other Letters

Authors: Carla Brinker and Kyle Koppe Cloud computing is incredibly popular, yet on an organizational level can still be mysterious. […] ...
PCI DSS 4.0 – Defined Approach vs. Customized Approach

PCI 4.0 – Let the fun begin

You’ve put it off, ignored it, or just been busy. Whatever the case, PCI version 4.0 is a reality as […] ...
The CMMC Proposed Rule is Out – Now What?

The CMMC Proposed Rule is Out – Now What?

What is CMMC? NIST Special Publication 800-171 (110 requirements) was first published in 2016 with an implementation requirement date of […] ...
PCI DSS 4.0 – What You Need to Know About INFI Worksheets

PCI DSS 4.0 – What You Need to Know About INFI Worksheets

Consistently maintaining compliance with any cyber security standard, especially a more prescriptive one like the PCI Data Security Standard (DSS), […] ...
PCI and Wireless Technologies

PCI and Wireless Technologies

While using wireless technologies in a PCI environment can be tricky, it is possible to configure it appropriately and obtain […] ...
PCI DSS 4.0 – Those Vulnerability Scans Just Got A LOT Tougher

PCI DSS 4.0 – Those Vulnerability Scans Just Got A LOT Tougher

Vulnerability scans are very configurable and range in efficacy based on the settings chosen. For instance, the scan can be […] ...