CMMC Assessment Process (Draft) is Published
Critical Infrastructure Series: Part III Operational Technology
Critical Infrastructure Series: Part III
Operational Technology Cybersecurity
In Part I of the Critical Infrastructure Series, we covered the importance of protecting the nation’s critical[...]
Corporate Account Takeover Attacks and Prevention
Justin Sylvester Shares Knowledge With SPECOPS on Corporate Account Takeover Attacks and Prevention
Identity theft comes in many forms, one being corporate account takeover. Corporate account[...]
Emergency Directive Issued for Select VMWare Products
On May 18, 2022, the Cybersecurity and Infrastructure Security Agency (CISA) issued
Emergency Directive (ED) (22-03) for select VMware products.
The directive confirmed active exploitation of the[...]
Critical Infrastructure Series: Part II
Critical Infrastructure Series: Part II
Making Sense of the Operational Technology Alphabet Soup
In Part I of the Critical Infrastructure Series, we covered the importance of protecting the nation’s[...]
Critical Infrastructure Series: Part I
What is so Critical about Critical Infrastructure?
Over the next several weeks we will be diving deeper and talking more extensively about the importance of protecting the nation’s critical[...]
Welcoming Sage Perkins-Hurd to SecureStrux
SecureStrux is excited to announce that Sage Perkins-Hurd has joined the SecureStrux Team to fill the role of Technical Recruiter, where she will lead recruiting for all internal company roles[...]
Meet Tony Buenger
CMMC and HIPAA: What is the Connection?
Consider this scenario; you are a Chief Information Security Officer (CISO) for a major university hospital system, with over 10 years of experience working with[...]