Author: Karen Walsh

CEO and Founder of Allegro Solutions, is a data-driven compliance expert and CMMC Registered Professional focused on cybersecurity and privacy who believes that securing today’s data protects tomorrow’s users. Karen has been published in the ISACA Journal experience in cybersecurity centers around compliance. Her work includes collaboration with security analysts and ghostwriting for c-suite level security leaders across a variety of internal and external vulnerability monitoring solutions. As a lawyer, she is deeply knowledgeable about security and privacy laws and industry standards including GDPR, CCPA, and ISO. She is currently under contract with Taylor& Francis and is writing a book about cybersecurity for small and midsized businesses.

Security practitioners across the US spent most of Thursday, May 13, reading over, hashing, rehashing, and then re-rehashing the “Executive Order on Improving the Nation’s Cybersecurity” (the Executive Order). Between the mandate for agencies to adopt zero trust, short timelines, and the “Software Bill of Materials,” the Executive Order seems to be far reaching and possibly overly hopeful. However, for those working in the Cybersecurity Maturity Model Certification (CMMC) space, the Order validates much of what they have been saying all along, CMMC is poised to be the One Standard to Rule Them All. Filtering Out the Noise The Executive…

Read More

With Election Day over, Americans await the final vote counts. As this contentious race coming to a close, securing digital data is now more critical to the democratic process than ever before. With nation-state actors seeking to undermine Americans’ trust in their time-honored process, ransomware attacks on local governments and disinformation campaigns will likely continue to rise. As Americans, we owe it to ourselves and our process to understand these threats and their actual impact on our electoral process. Cyberattacks undermine our democratic process when they reinforce disinformation campaigns because we fail to understand the attack type and its effects.…

Read More