About controlsecure

This author has not yet filled in any details.
So far controlsecure has created 24 blog entries.
f 09,24

Unique Aspects of GRC Cybersecurity in IT/OT Manufacturing

2024-10-28T23:06:54-04:00September 15th, 2024|

Manufacturing faces unique GRC cybersecurity challenges due to the convergence of IT and OT, complex global supply chains, and stringent regulatory requirements. Understanding these complexities is crucial for developing robust strategies that safeguard operations, intellectual property, and compliance.

f 07,24

The Gambia’s Central Bank Hack: The Need for NIST CSF and RMF

2024-10-28T23:08:30-04:00July 3rd, 2024|

The recent cyberattack on The Gambia's Central Bank highlights the critical vulnerability of infrastructure to cyber threats, with hackers potentially stealing two terabytes of sensitive data. The incident underscores the urgent need for robust cybersecurity measures to protect against sophisticated attacks and safeguard personal information.

f 01,21

SolarWinds Orion Countermeasures

2021-08-17T23:26:17-04:00January 28th, 2021|

The sophistication and audacious scale of the SolarWinds Orion attack is an inflection point for governments, organizations and security defenders worldwide. This post identifies the root causes and recommends unique technical and regulatory improvements.

f 01,21

Guide to CMMC Certification

2021-08-17T23:25:10-04:00January 7th, 2021|

CMMC was established to ensure greater cyber consistency from defense contractors and will be an absolute requirement to win DoD RFPs and/or have a contract awarded. Accelerate your readiness with our detailed guide.

f 01,21

5 Best Free VPNs in 2021

2021-02-04T16:35:06-05:00January 5th, 2021|

Is your VPN spying on you? Most VPNs fail to live up to their promise not to. With thousands to choose from, read our report to find out the 5 Best FREE VPNs the pros use that offer real anonymity on the world wide web, grant access to blocked content and secure all of your communication.

f 12,17

Cyber Risk Board Oversight

2021-02-18T10:03:37-05:00December 28th, 2017|

The high-profile breach of Target's data reinforced that cyber security does not only impact IT but also the whole of a business. The resignation of the CEO and CIO underscored the repurcussions a cyber-incident can have on the confidence in an organization's leadership, market reputation, and shareholder value.

f 11,16

The Case for Audit

2021-02-04T16:35:42-05:00November 27th, 2016|

Admin Assistant Jane was considered a “trusted employee” by the non-profit’s CEO. Jane also happened to own a bridal business and was regarded a "fairy godmother" for having donated over a million dollars. So how was Jane able to pocket $5 million dollars over an eight-year period, undetected?