Blog:
Security
Made
Simple

Blog Categories:

nist privacy framework
Demystifying NIST Privacy Framework: Building Innovative Privacy Solutions

Recap on NIST The National Institute of Standards and Technology (NIST) promotes the innovation and industrial competitiveness in the United States. It advances measurement science, standards, and tec…

latest news and updates cmmc
What are the Latest Updates on the CMMC?

Keeping you up to date with the latest news from the DoD on any new movements and updates in CMMC accreditation. What is the CMMC? Many articles have already explained the nuts and bolts of the CMMC, …

New report on remote working finds alarming security issues

HP recently announced the findings of two new reports titled “Rebellions & Rejection” and “Blurred Lines & Blindspots” – comprehensive global studies assessing organiza…

social engineering
Social Engineering: How People Use Your Trust

What is Social Engineering? Social engineering is a deceptive tactic used to manipulate individuals to give confidential and/or personal information. As a result, hackers may use this information to p…

zero trust security model
What You Need to Know About the Zero Trust Model

Zero Trust Security Defined As the number of cyber crimes increase day by day, organizations have started to adopt to Zero Trust Model. In this model, there are strict policies for identity verificati…

penetration testing - internal vs external
External vs. Internal Network Penetration Testing

The best way to ensure the safety of your organization’s network is to have a complete, 360-degree view of your cybersecurity structure. Therefore, you must determine the strength of your securi…

roles and responsibilities - good is not enough
“Good is not Enough” – 7 Cybersecurity Roles and Their Responsibilities

Corporate organizations’ concern for cybersecurity continues to grow each day – especially small and medium sized enterprises (SMEs) because they are the most vulnerable to cyber attacks. Therefore, c…

fundamentals to cybersecurity risk management
3 Fundamentals to Cybersecurity Risk Management

What is Cybersecurity Risk Management? Cyber risk management consists of the strategies your company implements to assess, mitigate, and protect your network from cybersecurity threats. It addresses a…

cyber posture vs cyber risk management
Cyber Posture vs Cyber Risk Management

With cybersecurity growing along with the advancement technology, more terms are used to describe a company’s network security. Many companies use third-party security to protect their information sys…

risk based approach to cybersecurity
3 Steps to Adopt a Risk-Based Approach to Cybersecurity

Introduction Cybersecurity continues to be a growing concern for corporate organizations. This is especially the case for small to medium enterprises (SMEs) because they are the most vulnerable to cyb…

grc - governance, risk, and compliance solution in cybersecurity
Advantages of an Integrated Governance, Risk, and Compliance Solution

The need for an integrated Governance, Risk, and Compliance (GRC) solution has become an important factor for organizations. As the regulatory environment changes, businesses must prioritize the adopt…

Privacy & Tech Hype Cycles

Buyer Beware: Many things that go up, eventually come down… There are several technologies in the market that claim to help you fulfill your compliance obligations with regards to local or global priv…

Follow along the journey

Follow us on social and never miss a post from this blog. Only original content and minimalist views, shared weekly on social.