Contact

Asset Owner Identification Automation for Vulnerability Management

A major Communications & Media company faced a large number of long-lived vulnerabilities in their service delivery network for which the asset owner was unknown. Without an asset owner for whom to turn for remediation, each day the situation was going from bad to worse. Their existing manual ownership identification processes were hopelessly overwhelmed by […]

Read More
icon / insight Created with Sketch.
Insight

Should a CISO be Better at Automation than Security?

As the story goes, and more recently popularized in the movie The Founder, Ray Kroc was speaking to a class at Harvard when asked “What business is McDonalds in?” “Restaurants!” “Hospitality!” “Supply Chain!” “Franchising!” “Entertainment!” “No!” Ray laughed and replied to each student. “Ladies and gentlemen, I’m not in the hamburger business. My business is real estate.” This […]

Read More
icon / insight Created with Sketch.
Insight

Industry Evolution of Modern Vulnerability Management

Vulnerability Management as a function has been around as long as we’ve had sophisticated IT and security organizations. Yet the overall scope and responsibilities of that function have morphed considerably over the past decade. Many organizations used to use a very narrow definition of vulnerability and simply compare configurations and software versions against a database […]

Read More
icon / insight Created with Sketch.
Insight

Preparing for the American Data Privacy & Protection Act

The average cost of a data breach in the United States is nearly 10 million dollars, the highest of any country in the world. In spite of this, the United States does not have a single comprehensive federal consumer privacy law comparable to the European Union’s General Data Protection Regulation (“GDPR”). Due to the fragmented […]

Read More
icon / insight Created with Sketch.
Insight

The Implications of AI-Assisted Code Development on Risk Management

AI-assisted code development (AICD) is a powerful tool that can be leveraged in the DevSecOps cycle to increase code efficiency. However, the increased speed and capacity for development also bring new risks to organizations. While organizations that are fast adopters of this technology will have a significant advantage over their competitors, their new development capabilities […]

Read More
icon / insight Created with Sketch.
Insight

Key Changes in PCI DSS 4.0 for Organizations to Address

Originally released in March 2022, version 4.0 of the Payment Card Industry Data Security Standard (PCI DSS 4.0) officially takes effect on March 31, 2024. The updated PCI DSS presents important changes to the world of payments, placing heavier emphasis on risk management practices, strong authentication capabilities and security awareness training. Learn more about the […]

Read More
icon / insight Created with Sketch.
Insight

Lost in Translation: Overlooking Culture Integration in M&A

Even though it’s widely known that culture alignment is important for business success, it’s often overlooked, especially within M&A scenarios. In many cases, there are clear operational and financial synergies that justify the transaction, and yet lacking culture alignment has led to countless failed integrations. Follow the link below to learn more about why cultural […]

Read More
icon / insight Created with Sketch.
Insight

Enhancing Supply Chain Efficiency Through JIT & Process Refinements

A Supply Chain is a network of organizations, people, processes, and resources involved in the production and delivery of products or services to an end consumer. This network involves a flow of goods which can involve procurement of raw materials, manufacturing, storage, distribution, delivery to customers, and recovery of goods. But, Supply Chain is more […]

Read More
icon / insight Created with Sketch.
Insight

The SEC’s Cybersecurity Incident Reporting Rule and What It Means to Your Company

Starting today, the SEC’s Cybersecurity Incident Reporting rule requires all publicly traded companies to report material cybersecurity breaches within four days. Companies must include standardized information to ensure consistent reporting of these incidents to the public. Like all SEC rules, there are financial penalties for non-compliance so company leadership should know how to respond when […]

Read More
icon / insight Created with Sketch.
Insight

The Future of Work with AI: Benefits, Limitations, and Ethical Concerns

The integration of Artificial Intelligence (AI) into the workplace marks a significant transformation in how tasks are performed and managed. While the landscape of AI has its limitations and ethical concerns, AI’s potential in the workplace is considerable and has the capability to automate a substantial portion of the average workday. Learn more here: Josh […]

Read More