The Benefit of an End-to-End Cybersecurity Solution
The Ever-Increasing Cybersecurity Risk: Is Anywhere Safe?
Emphasizing Continuous Compliance Monitoring
The concept of continuous monitoring has always existed. Everything that requires a periodic assessment by default requires continuous monitoring. The concept of continuous monitoring is a proactive[...]
CMMC Assessment Process (Draft) is Published
CMMC Assessment Process (Draft) is Published
Critical Infrastructure Series: Part III Operational Technology
Critical Infrastructure Series: Part III
Operational Technology Cybersecurity
In Part I of the Critical Infrastructure Series, we covered the importance of protecting the nation’s critical[...]
Corporate Account Takeover Attacks and Prevention
Justin Sylvester Shares Knowledge With SPECOPS on Corporate Account Takeover Attacks and Prevention
Identity theft comes in many forms, one being corporate account takeover. Corporate account[...]
RMF Continuous Monitoring (When You’re Out of Bandwidth)
In This Article
- Capability and budgets are not able to increase at the same rate as the complexity of the Risk Management Framework (RMF) and Continuous Monitoring.
- In 2019, Defense[...]
PowerStrux Standalone Auditor 5.0 Release and Updates
Introduction
Event monitoring is a challenging and intimidating task. A properly configured audit policy results in an extreme number of captured events, contributing to the difficult nature of[...]
Advanced Auditing with PowerShell
Auditing system events can be construed as a daunting, tedious, and intimidating task. The enablement of advanced audit policy configuration is often necessary to log the successes and failures[...]
PowerStrux 4.0 Updates
Does Continuous Monitoring and the evolving requirements take up to much of your time on a weekly and monthly basis? Our team has just released an updated version of the PowerStrux Standalone Auditor[...]