Cyber Risk

Corporate boards take note: The 2023 SEC rules for cyber disclosure have teeth

Corporate boards take note: The 2023 SEC rules for cyber disclosure have teeth

SEC tightens cybersecurity rules in 2023 2023 saw Federal authorities ratcheting down on Cybersecurity. In July, the U.S. Security and Exchange Commission [SEC] issued the latest final rules that enhance the SEC’s cybersecurity disclosure requirements. The new SEC Rules: Holding corporate boards accountable While this has been a topic of concern since cybercrime began to […]

Corporate boards take note: The 2023 SEC rules for cyber disclosure have teeth Read More »

Journey to CMMC

Introduction to NIST 800-171 cybersecurity framework The National Institute of Standards and Technologies issued NIST Special publication 800-171 cybersecurity framework to provide guidance, deliver requirements, and set expectations for Federal contractors and suppliers doing business with the Department of Defense (DOD). NIST 800-171 vs NIST 800-53 NIST 800-171 consists of 171 security controls that cover

Journey to CMMC Read More »

Cybersecurity digest 2023: a year in review

This content appears in our monthly email Security Digest, which unpacks recent security incidents, detailing what you should know, and what you should do. Sign-up to receive this digest below.   As the sun sets on 2023, it’s time for a retrospective glance at the cybersecurity landscape that has both challenged and advanced our industry

Cybersecurity digest 2023: a year in review Read More »

Spot the Fed: Mastodon, the Fediverse, and why you can’t run servers like it’s 1999

Decentralized technology has become an increasing topic of interest to technologists and enthusiasts seeking alternatives to the “walled garden” of many online communities and platforms. Spinning up a web service has become much easier with DevOps tooling, automation, and cloud services. However, the internet is more complex a place than it was twenty years ago.

Spot the Fed: Mastodon, the Fediverse, and why you can’t run servers like it’s 1999 Read More »

Cybersecurity digest: Ransomware, social engineering, and MFA negligence

The following article on recent cybersecurity news and events was written by Kalles Group Security Consultant, Jayanth Kumar. This content appears in our monthly email Security Digest, which unpacks recent security incidents and details what you should know, and what you should do.   Ransomware Resurgence: A Ticking Time Bomb   What you need to

Cybersecurity digest: Ransomware, social engineering, and MFA negligence Read More »

Why you should adapt the MITRE ATT&CK framework for threat intelligence

Cyber threats are becoming more severe with the widespread use of remote technologies and the increasing sophistication of attacks. Recent analyses indicate that attackers are exploiting vulnerabilities at unprecedented speeds. In 2023, the average time to exploit a vulnerability after public disclosure decreased to just five days, a significant reduction from 32 days in 2022.

Why you should adapt the MITRE ATT&CK framework for threat intelligence Read More »

Which information security framework is right for my business?

Which information security framework is right for my business?

Which Information Security Framework is Right for My Business? Picking the right security framework is important to protect your organization’s sensitive information and systems. With so many threats and regulations to think about, it’s important to have a plan in place to reduce risks and meet compliance requirements. A security framework provides step-by-step guidelines to

Which information security framework is right for my business? Read More »

Discover the intersection of artificial intelligence and cyber security. Explore risks, opportunities, and strategies for safeguarding your organization.

How to secure digital transformation initiatives

Securing digital transformation is paramount in today’s fast-paced technological landscape. As organizations embark on digitalization journeys, they open new doors to efficiency, agility, and innovation. However, this transformation also unveils an array of cybersecurity challenges. This article will dive deep into the critical intersection of digital transformation and cybersecurity. We’ll explore how businesses can navigate

How to secure digital transformation initiatives Read More »

Security Success: Navigating the Threat Landscape

In this ever-dynamic technology landscape, data drives business success, and cybersecurity has never been more critical. Small and mid-sized businesses (SMBs) are not immune to the ever-evolving threat landscape, making it imperative to be well-informed and proactive in protecting their digital assets. Recently, our team hosted an interactive webinar featuring Glen Wills, Kalles Group’s Practice

Security Success: Navigating the Threat Landscape Read More »

How to mitigate IoT risks using Zero Trust concept

  Sean Rosenberger wrote this article in 2017. The title was, “InfoSec and the Great IoT gold rush”. Ever since we have seen the Internet of Things revolutionize how we interact with technology and connect everyday devices and systems to the Internet. All in a bid to make our lives more convenient and efficient. However,

How to mitigate IoT risks using Zero Trust concept Read More »

Discover the intersection of artificial intelligence and cyber security. Explore risks, opportunities, and strategies for safeguarding your organization.

Can artificial intelligence win the war in cyberspace?

Ensuring that artificial intelligence (AI) is ‘secure by design’ and established on solid foundations poses a significant challenge in the cybersecurity space. As AI becomes increasingly pervasive across various technological domains and is integrated into critical systems, the imperative of ensuring secure design and deployment becomes paramount. Neglecting this aspect can potentially expose individuals and

Can artificial intelligence win the war in cyberspace? Read More »

Your future is secured when your business can use, maintain, and improve its technology

Request a free consultation