The NIST Cybersecurity Framework Functions - Protect
by Kyle Daun on April 30, 2018 at 1:34 PM
As promised in last month’s blog about the NIST Cybersecurity Framework Identify function, this month we are discussing the Protect function. After an organization has addressed the five categories within the Identify function (Asset Management (ID.AM), Business Environment (ID.BE), G …
The NIST Cybersecurity Framework - An Overview
by Kyle Daun on February 26, 2018 at 11:07 AM
Many people think of important dates in history and may think of July 4, 1776, the date the U.S declares independence, or July 20, 1969, Neil Armstrong walking on the moon. Another important date, while maybe not on the same scale, is still an important date in NIST history.
What is PCI Compliance?
by Kyle Daun on April 6, 2017 at 10:00 AM
What is PCI Compliance? The Payment Card Industry Data Security Standard (PCI DSS) is a set of security standards designed to ensure that regardless of size or number of transactions, any business that accepts, processes, stores or transmits credit card information maintains a secure …
How to Secure WiFi in 5 Simple Steps
by Kyle Daun on November 21, 2016 at 10:15 AM
The recent reports of rising cyber-attacks throughout the world have many businesses and people investigating ways that they can improve the cybersecurity of their work and home environments. Since the inception of the 802.11 protocols nearly 20 years ago, WiFi has become more prevale …
Difference Between Vulnerability Scanning & Penetration Testing
by Kyle Daun on September 17, 2015 at 9:39 AM
As an IT Security Auditor with Compass IT Compliance over the past few years, I have had the privilege of engaging with a diverse range of individuals, from Boston to Los Angeles, and many places in between. A question that comes up frequently is about the distinction between vulnerab …