How to Conduct a Cybersecurity Risk Assessment
Where to begin (and how to pitch) an organization-wide cybersecurity risk assessment A comprehensive cybersecurity risk assessment is a crucial step for organizations to identify and mitigate potential vulnerabilities and threats to their digital assets. It is, indeed, the first step to securing c-Suite buy-in and departmental adoption, finding funding ... Read More
Ensuring a Seamless and Secure Cloud Transformation
Nik Hewitt | | advice, application protection, Best Practices, Cloud, lateral movement, microsegmentation, next gen security, security, Security Research, zero trust
A holistic guide for CISOs and CTOs in guaranteeing and smooth and secure cloud transformation As cloud computing continues to dominate digital transformation – and justifiably so – organizations face a dual challenge: seamlessly shifting operations to the cloud and ensuring this transformation is secure. While cloud adoption promises scalability, ... Read More
Health Insurance Portability and Accountability Act (HIPAA) Best Practices
Nik Hewitt | | application protection, Best Practices, lateral movement, microsegmentation, security, Security Research, Supply Chain Attacks, visibility, zero trust
Highlighting the key elements of The Health Insurance Portability and Accountability Act to ensure HIPAA best practices The Health Insurance Portability and Accountability Act (HIPAA) is a vital piece of legislation that safeguards the privacy and security of individuals’ healthcare information. Compliance with HIPAA is crucial for healthcare providers, organizations, ... Read More
Cybersecurity Acronyms and Industry Abbreviations
A comprehensive A-Z of common cybersecurity industry acronyms, terminology, and IT security abbreviations As a writer for all things cybersecurity, I work under the product marketing division here at TrueFort. Between marketing and cybersecurity, there is no more a perfect storm for TLA (three-letter acronym). As such, as I’ve been ... Read More
Red Team Exercises on a Budget
Nik Hewitt | | advice, Best Practices, CISO, Cybersecurity, next gen security, security, Security Research
How can busy and financially stretched security teams conduct red team exercises on a budget? In our business world of escalating cybersecurity threats, the role of red team exercises is becoming increasingly vital. Yet, resource limitations and budget constraints can make these exercises seem daunting for many organizations. I heard ... Read More
The Power of Ring-Fencing Legacy Applications
Nik Hewitt | | application protection, application-centric, application-mesh, applications, Best Practices, Platform News, Security Research
Legacy applications are a minefield, but why ringfence them instead of updating or decommissioning them? Legacy applications often play critical roles in an organization’s operations. They may contain business-critical functions or data and are typically deeply embedded in a company’s IT infrastructure. However, these applications can become costly to maintain ... Read More
Manufacturing Industry Cybersecurity Best Practices
Nik Hewitt | | advice, applications, Best Practices, device protection, iot, IT-OT, lateral movement, microsegmentation, Security Research, zero trust
Critical gaps in manufacturing industry cybersecurity, exposing organizations to regulatory pitfalls and downtime, need robust protection and team insight Cybersecurity has become a crucial concern for the production sector, with manufacturing industry cybersecurity now a major consideration for the c-Suite. Today’s interconnected industrial systems, driven by the advent of Industry ... Read More
Medical Device Security: Securing IT and OT Healthcare
Nik Hewitt | | application protection, Best Practices, device protection, iot, IT-OT, microsegmentation, security, Security Research, zero trust
“First, do no harm.” A vital preemptive necessity, IT and OT medical device security has never been more important than right now. Modern healthcare leans heavily on Information Technology (IT) and Operational Technology (OT) medical devices. Regrettably, these devices are facing a veritable tsunami of cyber threats that can jeopardize ... Read More
Supply Chain Security for NIST Best Practices
Nik Hewitt | | application protection, Best Practices, lateral movement, microsegmentation, security, Security Research, zero trust
How can organizations mitigate risk and adhere to NIST supply chain security best practices in an interconnected world? Today’s supply chains’ elaborate, interconnected nature introduces a myriad of complex cybersecurity risks. From third-party vendors to logistics providers, each additional entity presents new potential points of supply chain security vulnerability. Managing ... Read More
Why Financial Institutions Must Have Lateral Movement Protection
How can financial institutions protect valuable assets by fortifying defenses with layered security and lateral movement protection? As a cornerstone of the global economy, the banking and financial sector finds itself at the frontline of the cyber battlefield. Cybercriminals, drawn to the vast stores of valuable data and the direct ... Read More