Uros

What Is the Cybersecurity Maturity Model Certification (CMMC)?

Robbie Araiza    ·      Thursday, March 2nd, 2023 What Is the Cybersecurity Maturity Model Certification (CMMC) and Who Does It Apply To? The Cybersecurity Maturity Model Certification (CMMC) is a comprehensive assessment framework and certification program launched by the Department of Defense to protect the Defense Industrial Base (DIB) from increasingly frequent and complex cyberattacks. It

What Is the Cybersecurity Maturity Model Certification (CMMC)? Read More »

Celebrating U.S. Black History Through Community at… | BeyondTrust

February was Black History Month in the United States, and for the entire month, BeyondTrust celebrated with multiple events and opportunities for community sharing. The event series was hosted by Black@BT, a BeyondTrust employee resource group that is dedicated to building a safe and productive space for black employees and allies. Black@BT began creating space

Celebrating U.S. Black History Through Community at… | BeyondTrust Read More »

Security News—Biden’s Cybersecurity Strategy, CISA Calls Out Tech Companies, Dish Network Ransomware Attack, Hackers Beat MFA and More

The Biden administration released a national cybersecurity strategy that advocates for more tech regulation and software liability reform, including imposing minimum security standards for critical infrastructure and shifting responsibility for maintaining cybersecurity from consumers and small businesses to larger software makers. The new approach marks a shift away from the government’s emphasis on information sharing

Security News—Biden’s Cybersecurity Strategy, CISA Calls Out Tech Companies, Dish Network Ransomware Attack, Hackers Beat MFA and More Read More »

Alluvio IQ Leverages Third-Party Data

According to Enterprise Management Associates, 64% of organizations use 4-10 monitoring tools, while another 17% use 11 or more. This tools sprawl exacerbates the challenge of correlating disparate data sources to determine root cause of complex incidents. Additionally, problems such as alert fatigue, death by dashboards, and a lack of technical expertise also often coincide

Alluvio IQ Leverages Third-Party Data Read More »

What’s Next After Log4Shell?

Table of Contents How To Deal With the Next Open-Source Vulnerability Using Custom Scripts [embedded content] A critical vulnerability in Apache’s Log4j Java-based logging utility (CVE-2021-44228) was previously referred to as the “most critical vulnerability of the last decade.” In the wake of Log4Shell exploits, many security professionals are concerned about the next potential open-source

What’s Next After Log4Shell? Read More »