2 min read
4 Steps to Strengthen Your Cybersecurity Program in 2024
As we get ready to usher in the new year, it's essential to assess and enhance your cybersecurity program. Let’s explore four key strategies to...
2 min read
As we get ready to usher in the new year, it's essential to assess and enhance your cybersecurity program. Let’s explore four key strategies to...
1 min read
As attackers are finding new ways to get around multifactor authentication in Microsoft 365, conditional access is becoming more important....
2 min read
Ever heard Rick Howard's analogy of networks being like M&M candies? Imagine a hard exterior shell but with a soft, less secure core. Traditional...
1 min read
Reviewing Complementary User Entity Controls (CUECs) is an important part of any financial institution’s third-party management program. However, we...
2 min read
A little over a year ago, banking regulators released the “Authentication and Access to Financial Institution Services and Systems” guidance. Since...
1 min read
What exactly is a user access review? In its simplest form, this review is a process that certifies that users’ (including vendors’) access within...