How to Conduct a Cybersecurity Risk Assessment

Where to begin (and how to pitch) an organization-wide cybersecurity risk assessment  A comprehensive cybersecurity risk assessment is a crucial step for organizations to identify and mitigate potential vulnerabilities and threats to their digital assets. It is, indeed, the first step to securing c-Suite buy-in and departmental adoption, finding funding ... Read More

Ensuring a Seamless and Secure Cloud Transformation

A holistic guide for CISOs and CTOs in guaranteeing and smooth and secure cloud transformation  As cloud computing continues to dominate digital transformation – and justifiably so – organizations face a dual challenge: seamlessly shifting operations to the cloud and ensuring this transformation is secure. While cloud adoption promises scalability, ... Read More

Health Insurance Portability and Accountability Act (HIPAA) Best Practices

Highlighting the key elements of The Health Insurance Portability and Accountability Act to ensure HIPAA best practices  The Health Insurance Portability and Accountability Act (HIPAA) is a vital piece of legislation that safeguards the privacy and security of individuals’ healthcare information. Compliance with HIPAA is crucial for healthcare providers, organizations, ... Read More
Tom Lehrer - The Elements - LIVE FILM From Copenhagen in 1967

Cybersecurity Acronyms and Industry Abbreviations 

A comprehensive A-Z of common cybersecurity industry acronyms, terminology, and IT security abbreviations   As a writer for all things cybersecurity, I work under the product marketing division here at TrueFort. Between marketing and cybersecurity, there is no more a perfect storm for TLA (three-letter acronym). As such, as I’ve been ... Read More

Red Team Exercises on a Budget

How can busy and financially stretched security teams conduct red team exercises on a budget?  In our business world of escalating cybersecurity threats, the role of red team exercises is becoming increasingly vital. Yet, resource limitations and budget constraints can make these exercises seem daunting for many organizations. I heard ... Read More

The Power of Ring-Fencing Legacy Applications

Legacy applications are a minefield, but why ringfence them instead of updating or decommissioning them? Legacy applications often play critical roles in an organization’s operations. They may contain business-critical functions or data and are typically deeply embedded in a company’s IT infrastructure.   However, these applications can become costly to maintain ... Read More

Manufacturing Industry Cybersecurity Best Practices

Critical gaps in manufacturing industry cybersecurity, exposing organizations to regulatory pitfalls and downtime, need robust protection and team insight  Cybersecurity has become a crucial concern for the production sector, with manufacturing industry cybersecurity now a major consideration for the c-Suite. Today’s interconnected industrial systems, driven by the advent of Industry ... Read More

Medical Device Security: Securing IT and OT Healthcare

“First, do no harm.” A vital preemptive necessity, IT and OT medical device security has never been more important than right now. Modern healthcare leans heavily on Information Technology (IT) and Operational Technology (OT) medical devices. Regrettably, these devices are facing a veritable tsunami of cyber threats that can jeopardize ... Read More

Supply Chain Security for NIST Best Practices

How can organizations mitigate risk and adhere to NIST supply chain security best practices in an interconnected world? Today’s supply chains’ elaborate, interconnected nature introduces a myriad of complex cybersecurity risks. From third-party vendors to logistics providers, each additional entity presents new potential points of supply chain security vulnerability. Managing ... Read More

Why Financial Institutions Must Have Lateral Movement Protection

How can financial institutions protect valuable assets by fortifying defenses with layered security and lateral movement protection? As a cornerstone of the global economy, the banking and financial sector finds itself at the frontline of the cyber battlefield. Cybercriminals, drawn to the vast stores of valuable data and the direct ... Read More