Posts by Vaughn Camarda

  1. NIST Cybersecurity Framework 2.0 And Why It Matters

    The National Institute of Standards and Technology (NIST) recently unveiled version 2.0 of its respected Cybersecurity Framework. This update represents a significant advancement in one of the most extensively adopted cybersecurity guidelines across various industries. The release highlights several crucial aspects of the rapidly evolving cybersecurity threat landscape, including a heightened focus on modern threats…

  2. Why Healthy IGA Is Essential for Effective Cybersecurity

    Securing your organization’s IT infrastructure starts with minimizing the risk of unauthorized access to your sensitive data and applications. Too many data breaches can be traced directly to an organization not having sufficient control over access and permissions. Even organizations that can show compliance with industry-specific standards and regulations frequently do not have enough insight…

  3. Building Resilient and Secure Networks for Government Agencies at the Zero Trust Government Symposium

    Defense Strategies Insitute‘s 2nd Annual Zero Trust Government Symposium will address in depth discussions on insulating battlefield operations, ensuring secure information sharing, transitioning to a hybrid workforce, defining adoption milestones, defeating adversaries, and addressing challenges in Zero Trust strategy. Attendees at the 2024 Symposium on July 17-18 in National Harbor, MD will have the unique…

  4. Top Cybersecurity Trend Predictions for 2024: BeyondTrust Edition

  5. Cyber Security Awareness Tips – Remote Edition

    As we observe the 20th anniversary of of Cybersecurity Awareness Month, I thought it was time for us to revisit some common good practices for remote computing. Please make use of the IDSA resources and consider joining to unlock access for even more! About the Author: Jeff Reich, CISSP, CRISC, ITIL – Executive Director of…

  6. SailPoint: How identity security can be a business accelerator.

    This blog was originally published at SailPoint: How identity security can be a business accelerator. In a previous blog, I talked about a couple of “forcing functions” that dramatically increased the relevance and criticality of identity security in securing the modern enterprise. The most obvious was the pandemic and in short succession, the significant acceleration…

  7. Compliance Strategies for Blockchain-Based Identity Management Solutions

    Introduction A blockchain is a virtually distributed system consisting of a series of time-stamped, immutable data records with each “block” of information stored across a wide range of computer networks. It is increasingly being utilized in various information security spaces including identity management. Identity management refers to all the processes and technologies an organization uses…

  8. Cerby: The Hidden Cybersecurity Threat in Organizations: Nonfederated Applications

  9. Will Passwords Become a Thing of the Past?

    Even though we are big believers in strong, unique passwords, we even get headaches about generating, maintaining, and safely storing hundreds of passwords. They are somehow too easily cracked by today’s cybercriminals but impossible for us to remember at the same time. Now many people are dreaming of a more secure future, a future where…

  10. BeIdentitySmart, BeCyberSmart for Security Practitioners

    The phrase “a dog is for life, not just for Christmas” was coined by British animal welfare charity Dogs Trust over 40 years ago and still rings true to this day. The same theory must also be applied to securing digital identities in our increasingly turbulent modern business world. It’s all well and good having…

Background

READY TO MAKE AN IMPACT?

Let's work together to help everyone become more secure.