Data Classification

Data Classification Guide and The NIST Classification Levels

| | NIST
Data Classification Guide and The NIST Classification Levels One of the biggest challenges for a business with any sort of information security needs is ensuring proper handling of that information. With hundreds ...
Breaking it Down: A Data-Centric Security Perspective on NIST Cybersecurity Framework 2.0

Breaking it Down: A Data-Centric Security Perspective on NIST Cybersecurity Framework 2.0

| | Data Security, NIST
On February 26, 2024, NIST released version 2.0 of the Cybersecurity Framework. This blog reviews the fundamental changes introduced in CSF 2.0 and data-centric security considerations that should be made when aligning ...

What’s New in Version 2.0 of the NIST Cybersecurity Framework (CSF)

| | Blog, Business of Cyber, NIST
The NIST Cybersecurity Framework (CSF) is a voluntary, non-prescriptive cybersecurity framework that has been developed ...

NIST Cybersecurity Framework 2.0

NIST has released version 2.0 of the Cybersecurity Framework: The CSF 2.0, which supports implementation of the National Cybersecurity Strategy, has an expanded scope that goes beyond protecting critical infrastructure, such as ...
AI, cyber GRC, Microsoft AI cybersecurity

NIST: Better Defenses are Needed for AI Systems

The accelerating development and expanding deployment of AI systems is creating significant security and privacy risks that aren’t being mitigated by modern solutions, according to a research paper from the U.S. National ...
Security Boulevard
SMBs, threats, shutdown SMBs cybercriminals business ransomware malware Kaseya 6 Ways Poor Cybersecurity Hurts Businesses

Why Cybersecurity Needs To Be an SMB Priority

SMBs are low-hanging fruit for cybercriminals because they have limited IT resources, staff and cybersecurity defenses ...
Security Boulevard
Proactive Defense: The Importance of Analyzing User Identity Data in a Zero Trust Framework

Proactive Defense: The Importance of Analyzing User Identity Data in a Zero Trust Framework

User identity data is a fundamental piece of safeguarding sensitive information, critical systems, and digital assets. Understanding and monitoring how users interact with technology, their access patterns, authentication habits, and overall digital ...
Significant Changes from NIST SP 800-53 rev4 to rev5

Significant Changes from NIST SP 800-53 rev4 to rev5

| | NIST
Intro and summary of changes (ABSTRACT) The National Institute of Standards and Technology has introduced a new revision of the Special Publication 800-53, revision 5. As with any document change of this ...
™

Ripcord Transforms, Anitian Empowers, Agencies Win

As far back as 2011 a presidential mandate said, “Records are the foundation of open government.” This mandate went on to say that accessible, readable public records supported the “principles of transparency, ...
The Rise of Zero Trust

The Rise of Zero Trust

Zero Trust is an evolving security framework that operates on the principle of "never trust, always verify." It assumes no user or device should be inherently trusted, regardless of location or network ...