Skip to content

Blogs

CVE and Beyond: Security Implications in Device Configuration

According to the latest Verizon Data Breach Investigations report there has been a ‘180% increase in the exploitation of vulnerabilities as the critical path action to initiate a breach’, so it’s not surprising that keeping on top of vulnerabilities is of critical importance....

DoD introduces CORA program

Following a years-long effort to move away from a cybersecurity inspection mindset focused on compliance, the US Department of Defense (DoD) announced the formalization of this shift to a focus on operational readiness through the launch of the Cyber Operational Readiness...

Zero Trust Effective Network Segmentation

In an ideal world, all your critical data and the devices protecting it would be disconnected from the rest of the world, air-gapped, in a bunker under a mountain guarded by security detail. That way you know it is secure. If it’s not connected, then how can a remote attacker...

Compliance Certifications