Skip to content
Demystifying Policy as Code Non Technical Guide Effective Governance

ScaleSec Blog

Aaron Wilson4 min read

Time to Upgrade your MFA for FedRAMP!

A phishing-resistant MFA is now required for FedRAMP.
Start Reading
Aaron Wilson8 min read

Of Apples and Oranges: Combining NIST Publications for Robust Security

This post explains the purpose of the NIST Cybersecurity Framework and NIST Special ...
Start Reading
Cameron McCloud11 min read

Using AWS Config and Systems Manager for File Integrity Monitoring

Part 1 of planned two part article exploring whether AWS Config and Systems Manager can ...
Start Reading
Eric Evans2 min read

Automating Cloud Policies with OSCAL

How NIST’s Open Security Controls Assessment Language be leveraged for security policy ...
Start Reading
Luis Pastor6 min read

HIPAA Compliance in the Cloud

Implementing HIPAA Compliance Using Cloud Infrastructure.
Start Reading
Justin Travis7 min read

Security Protection Using NIST CSF

Set up your organization up for success with NIST CSF.
Start Reading
Steven Adegbenle6 min read

Cloud-Native Ransomware Protection in GCP

GCP Cloud-Native way to fend off ransomware.
Start Reading
Eric Evans3 min read

Forensics in AWS

Automating forensics in AWS can modernize your incident response process and grow your ...
Start Reading
Sarah Gori10 min read

Deep Dive on the Cybersecurity Executive Order

Themes, requirements, and implementation expectations driven by the Cybersecurity ...
Start Reading
Allison DiPietro4 min read

Cybersecurity Executive Order: a tl;dr

What the White House’s Executive Order on Cybersecurity means for software companies, and ...
Start Reading