Time to Upgrade your MFA for FedRAMP!
A phishing-resistant MFA is now required for FedRAMP.
Of Apples and Oranges: Combining NIST Publications for Robust Security
This post explains the purpose of the NIST Cybersecurity Framework and NIST Special ...
Using AWS Config and Systems Manager for File Integrity Monitoring
Part 1 of planned two part article exploring whether AWS Config and Systems Manager can ...
Automating Cloud Policies with OSCAL
How NIST’s Open Security Controls Assessment Language be leveraged for security policy ...
HIPAA Compliance in the Cloud
Implementing HIPAA Compliance Using Cloud Infrastructure.
Security Protection Using NIST CSF
Set up your organization up for success with NIST CSF.
Cloud-Native Ransomware Protection in GCP
GCP Cloud-Native way to fend off ransomware.
Forensics in AWS
Automating forensics in AWS can modernize your incident response process and grow your ...
Deep Dive on the Cybersecurity Executive Order
Themes, requirements, and implementation expectations driven by the Cybersecurity ...
Cybersecurity Executive Order: a tl;dr
What the White House’s Executive Order on Cybersecurity means for software companies, and ...