Blog
Data Mapping and Inventory: What they are, How important are they, and How to do them.
Effectively managing your data is critical for compliance, risk reduction, and informed decision-making. Data mapping and inventory are foundational practices for any organization...
Cheap (Cybersecurity) Wisdom
Russell Eubanks in a SANS Institute video “Improve Your Cyber Security Culture” offers the following advice learned from one of his own mentors:...
Defining "Reasonable Cybersecurity"
State laws, legal cases, grant requirements, cyber insurance, and those impacted by data exposure all may refer to the term “reasonable cybersecurity” when...
Ethical Hacking?
When we usually think of hacking, we think of someone sitting in a dark room with a hoodie on, furiously typing away as...