Security Awareness

Intel transparency supply chain security cybersecurity

The Importance of Transparency: Finding the Balance Between Security and Visibility

Vulnerabilities are a simple fact of life. The goal for vendors and organizations is not to strive to create perfect hardware or software that has no vulnerabilities—there is no such thing. What’s important is ensuring that relevant details and context

The Importance of Transparency: Finding the Balance Between Security and Visibility Read More »

Jayson Street hacker bank robber hugs social engineering

Jayson Street – Hacking and Social Engineering and Why There are No ‘Black Hat’ Hackers

TechSpective Podcast Episode 063 What is a hacker? This is a question that has been debated for decades in the cybersecurity arena. Media conflated hacker and cybercriminal very early on, and it has been challenging to correct that error and

Jayson Street – Hacking and Social Engineering and Why There are No ‘Black Hat’ Hackers Read More »

cybersecurity maturity model CMMC standard

The Cybersecurity Executive Order: Why CMMC May Be the One Standard to Rule Them All

Security practitioners across the US spent most of Thursday, May 13, reading over, hashing, rehashing, and then re-rehashing the “Executive Order on Improving the Nation’s Cybersecurity” (the Executive Order). Between the mandate for agencies to adopt zero trust, short timelines,

The Cybersecurity Executive Order: Why CMMC May Be the One Standard to Rule Them All Read More »

Scroll to Top