The National Institute of Standards and Technology (NIST) recently unveiled version 2.0 of its respected Cybersecurity Framework. This update represents a significant advancement in one of the most extensively adopted cybersecurity guidelines across various industries. The release highlights several crucial aspects of the rapidly evolving cybersecurity threat landscape, including a heightened focus on modern threats…
Posts by Vaughn Camarda
-
Why Healthy IGA Is Essential for Effective Cybersecurity
Securing your organization’s IT infrastructure starts with minimizing the risk of unauthorized access to your sensitive data and applications. Too many data breaches can be traced directly to an organization not having sufficient control over access and permissions. Even organizations that can show compliance with industry-specific standards and regulations frequently do not have enough insight…
-
Building Resilient and Secure Networks for Government Agencies at the Zero Trust Government Symposium
Defense Strategies Insitute‘s 2nd Annual Zero Trust Government Symposium will address in depth discussions on insulating battlefield operations, ensuring secure information sharing, transitioning to a hybrid workforce, defining adoption milestones, defeating adversaries, and addressing challenges in Zero Trust strategy. Attendees at the 2024 Symposium on July 17-18 in National Harbor, MD will have the unique…
-
Cyber Security Awareness Tips – Remote Edition
As we observe the 20th anniversary of of Cybersecurity Awareness Month, I thought it was time for us to revisit some common good practices for remote computing. Please make use of the IDSA resources and consider joining to unlock access for even more! About the Author: Jeff Reich, CISSP, CRISC, ITIL – Executive Director of…
-
SailPoint: How identity security can be a business accelerator.
This blog was originally published at SailPoint: How identity security can be a business accelerator. In a previous blog, I talked about a couple of “forcing functions” that dramatically increased the relevance and criticality of identity security in securing the modern enterprise. The most obvious was the pandemic and in short succession, the significant acceleration…
-
Compliance Strategies for Blockchain-Based Identity Management Solutions
Introduction A blockchain is a virtually distributed system consisting of a series of time-stamped, immutable data records with each “block” of information stored across a wide range of computer networks. It is increasingly being utilized in various information security spaces including identity management. Identity management refers to all the processes and technologies an organization uses…
-
Will Passwords Become a Thing of the Past?
Even though we are big believers in strong, unique passwords, we even get headaches about generating, maintaining, and safely storing hundreds of passwords. They are somehow too easily cracked by today’s cybercriminals but impossible for us to remember at the same time. Now many people are dreaming of a more secure future, a future where…
-
BeIdentitySmart, BeCyberSmart for Security Practitioners
The phrase “a dog is for life, not just for Christmas” was coined by British animal welfare charity Dogs Trust over 40 years ago and still rings true to this day. The same theory must also be applied to securing digital identities in our increasingly turbulent modern business world. It’s all well and good having…