Month: February 2020

Mitigating Cloud Vulnerabilities – National Security Agency

National Security Agency – Mitigating Cloud Vulnerabilities National Security Agency guidance on how to reduce overall exposure to the risk cloud presents and how to enhance your security posture. While careful cloud adoption can enhance an organization’s security posture, cloud services can introduce risks that organizations should understand and address both during the procurement process and while operating in the cloud. Fully evaluating security implications when shifting resources to the cloud will help ensure continued resource availability and reduce risk of sensitive information exposures. To implement effective mitigations, organizations should consider cyber risks to cloud resources, just as they would in an on-premises environment. This document divides cloud vulnerabilities into …

Mitigating Cloud Vulnerabilities – National Security Agency Read More »

National Security Agency - Mitigating Cloud Vulnerabilities

Aligning to the NIST CSF in the AWS Cloud

Aligning to the NIST CSF in the AWS Cloud Abstract: Governments, industry sectors, and organizations around the world are increasingly recognizing the NIST Cybersecurity Framework (CSF) as a recommended cybersecurity baseline to help improve the cybersecurity risk management and resilience of their systems. This paper evaluates the NIST CSF and the many AWS Cloud offerings public and commercial sector customers can use to align to the NIST CSF to improve your cybersecurity posture. It also provides a third-party validated attestation confirming AWS services’ alignment with the NIST CSF risk management practices, allowing you to properly protect your data across AWS. DOWNLOAD

Aligning to the NIST CSF in the AWS Cloud

Data Protection and Privacy Compliance in the Cloud

Data Protection and Privacy Compliance in the Cloud: Privacy Concerns Are Not Slowing the Adoption of Cloud Services, but Challenges Remain Executive Summary: The Ponemon Institute is pleased to present the findings of Data Protection and Privacy Compliance in the Cloud, sponsored by Microsoft. The purpose of this research to better understand how organizations undergo digital transformation while wrestling with the organizational impact of complying with such significant privacy regulations as the GDPR. This research explored the reasons organizations are migrating to the cloud, the security and privacy challenges they encounter in the cloud, and the steps they have taken to protect sensitive data and achieve compliance. Key Findings: Privacy concerns are …

Data Protection and Privacy Compliance in the Cloud Read More »

Data Protection and Privacy Compliance in the Cloud

Mapping Microsoft Cyber Offerings to NIST

Mapping Microsoft Cyber Offerings to: NIST Cybersecurity (CSF), CIS Controls and ISO27001:2013 Frameworks The NIST Cybersecurity Framework (CSF) is a voluntary Framework consisting of standards, guidelines, and best practices to manage cybersecurity-related risk. The Framework complements an organization’s risk management process and cybersecurity program. The organization can use its current processes and leverage the Framework to identify opportunities to strengthen and communicate its management of cybersecurity risk while aligning with industry practices. Alternatively, an organization without an existing cybersecurity program can use the Framework as a reference to establish one. Microsoft Cyber Offerings that can help an organization meet the security functions Certain functions that should be fulfilled by the …

Mapping Microsoft Cyber Offerings to NIST Read More »

Mapping Microsoft Cyber Offerings to NIST

The Disaster Recovery Difference

Backup versus Disaster Recovery: Making the Right Assessment In data protection, recognizing when a data loss event is a minor blip versus a major catastrophe adds tremendous value to our clients – determining the action taken and the impact to their bottom line. Sometimes accessing a secure backup is sufficient. Other times critical data must be instantaneously recovered.      

The Disaster Recovery Difference

Active Shooter Defense

You should feel safe where you work, worship, learn, & play… Defendry watches your security cameras 24/7 to automatically detect, deter, and report potential threats in just seconds. Early detection can even automatically lock a shooter out before entering. 2,808 Causalities from Active Shooter Incidents in the United States from 2000 to October 2019 Automatic Lockdown 24/7 Human Verification Immediate Emergency Notifications

Active Shooter Defense
Scroll to Top