Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

CISO Global

Take it From a Compliance Officer: Secure Networks Matter

Even before the fiasco at Silicon Valley Bank, financial institutions were under tremendous scrutiny from regulators. How could they not be? Banks are among the oldest known targets for theft, and in a digital age, the best way to extract money is going to be either straight cyber-theft from existing accounts or ransomware. IT systems that house customers’ financial data can be architected with the right security controls in place to protect that data to the highest standard.

Does ChatGPT Know Your Secrets? Threats and Benefits of AI in Your Environment

ChatGPT has been taking the World by storm, but it’s bringing with it issues around cybersecurity, data protection, and data privacy. IT leaders and business leaders are looking to create policies that will help protect their people and corporate assets, but so few people really understand the technology well enough to grasp and weigh the benefits, the concerns, and implications for the cybersecurity industry, in general.

Why Is CMMC a Big Deal?

The Cybersecurity Maturity Model Certification (CMMC) has been around for a few years. And, in its short tenure, it has, itself, matured. The current version of the CMMC is 2.0, released in November 2021. In the latest version of the model, the original five-level model hierarchy was collapsed into three distinct levels: Foundational, Advanced, and Expert.

Lessons from the Field, Part II: Could Better IT Strategies Help You Retain Employees?

While a number of organizations have moved back to an in-person work model, some employees are pushing back and leaving for jobs that will allow them to work from home (WFH). Having become accustomed to the advantages of a WFH model, employees have a lower tolerance for inconveniences like time and money spent on commutes, being away from loved ones for long hours, packing lunches, and having to dress for an office environment.