Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

February 2022

Cybersecurity Asset Management: Know What's on Your Network

Guessing how many marbles are in a jar is either a fun carnival game (pick the average based on the wisdom of the crowd) or a math problem involving orb volume, cylinder volume and the estimated space between marbles. You can also just count the marbles. Unfortunately, when it comes to identifying the number of devices connected to your network, none of these approaches works – although quasi-manual counting remains all too common.

BlackByte Ransomware Breach: Can't Forget Compliance Basics

On Sunday, Feb. 13, the NFL’s San Francisco 49er organization issued a statement confirming they experienced a network security incident. Shortly after the incident, BlackByte ransomware gang listed the 49ers as one of their alleged victims. The 49ers franchise didn’t confirm if ransomware was involved, but it did state that only the corporate IT network was affected. As with all breaches, one commonality eventually appears: vulnerabilities.

How to meet OMB's Zero Trust Strategy goals for IT, IoT and OT Devices

On Jan. 26, the Office of Management and Budget (OMB) published its widely anticipated final version of its zero trust architecture strategy, identifying top cybersecurity priorities for the federal government. This achievement raises the country’s cyber defense strategy to a level commensurate with the “increasingly sophisticated and persistent threat campaigns” it faces.