Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

CISO Global

Becoming FedRAMP and StateRAMP Authorized Part 4: Can Continuous Monitoring Actually Give You a Leg Up?

Validating the security of your organization’s sensitive information at a single point in time with an annual risk assessment can be helpful, but what about the other 364 days of the year? If you have a cloud application and hope to sell your services to federal agencies, point-in-time assessments won’t be enough.

CISO Global Participates in Microsoft Security Copilot Partner Private Preview

CISO Global announces its participation in the Microsoft Security Copilot Partner Private Preview. CISO Global was selected based on their proven experience with Microsoft Security technologies, willingness to explore and provide feedback on cutting edge functionality, and their close relationship with Microsoft.

Move to the Cloud with Confidence: 6 Key Risks & Mitigation Techniques, Part 3

Cloud application, platform, and infrastructure vendors (cloud service providers, or CSPs) do a great job of advertising online. They offer seemingly painless ways to sign up for their services through “freemiums” and two-week trials, advertisements that follow you from Google to LinkedIn, and what appear to be straight-forward sales processes.

PCI 4.0: What is coming, and what do you need to do about it?

PCI DSS 4.0 is coming, and getting your organization up to speed will be no small task. Don't wait until the last minute. Hear Payment Card Industry (PCI) Qualified Security Assessors Brian Dean and Joe Moser as they explain the key differences between PCI 4.0 and PCI 3.2.1, what to expect with the new release, and which steps you need to take right away to prepare.

CMMC 2.0 Preparation: Top Four Strategic Actions to Take Now

The Cybersecurity Maturity Model Certification (CMMC) 2.0 is a compliance requirement that all Department of Defense (DoD) Contractors (aka, the Defense Industrial Base) will soon have to meet. See my blog Why is CMMC a Big Deal? for more information about the legal implications of CMMC. The CMMC official mandate is expected to be released from rulemaking in the first quarter of 2024 and be in full implementation in the first quarter of 2026.

Creating a Culture of Cybersecurity Part I: The 8 Benefits of Insourcing Your IT Help Desk

What is the culture of cybersecurity, anyway? When most people hear the phrase “Cybersecurity is a Culture,” their minds jump immediately to cybersecurity awareness training videos that help employees avoid phishing scams. Certainly, that is an important part of driving security awareness in your organization, but the true culture of cybersecurity is so much more. To quote our CTO, Jerald Dawkins, Ph.D., “Cybersecurity is a team sport.

CISO Global - Building a Culture of Cybersecurity

A leader in cybersecurity and compliance services, CISO Global brings together expert practitioners and thought leaders to provide tailored solutions that drive cyber resilience. The company’s top-tier talent spans geographies, specialties, industries, regulatory frameworks, and focus areas and includes auditors, compliance specialists, certified forensics experts, ethical hackers, security engineers, and around-the-clock analysts.

Ready or Not, Here Comes PCI 4.0

If your organization has complied with the PCI DSS (Payment Card Industry Data Security Standard) for any length of time, the most recent release (PCI 4.0) is probably not news to you. In fact, despite the new version PCI compliance may feel like business as usual for you. ASV scanning, penetration testing, and a comprehensive compilation of documentation are probably well under way – and you may even have scheduled your next audit with a QSA. Easy, right?

Demystifying the Dark Web and DarkNets, Part V-FINs, APTs, Rogues, Hacktivists, Cyber Warriors, and Accidentals

In our last installment of this series, we were introduced to some dangerous characters one might encounter on darknets. This week, we will finish out that list, looking into both organized groups and individuals. Wrapping my head around why people do what they do, and how they execute operations that end up costing corporations millions, is always fascinating.