Useful Information

Resources

Sign-in required: identity & access problems in a distributed world

Got identity problems on your mind? You aren’t alone. Last year, on April 12th, IDS Alliance and National Cybersecurity Alliance founded Identity Management Day. In celebration of this day,  we want to recognize the significance of Identity & Access Management, commonly IdM, or IAM, by  sharing pain points  that our customers face when it comes…

Read More...

April Fools

Did we fool you? While we take security seriously, our team knows when it’s appropriate to pause for a laugh. Hopefully you didn’t find our headlines too pun-ishing. If they made you chuckle, you might be a great fit for Kalles Group! See our latest open roles here and Join Our Team.   Jokes aside,…

Read More...

Shields up. White House calls for urgent action

The White House issued an announcement on March 21st that evolving intelligence has shown that Russia may be exploring options for potential cyberattacks on American businesses. Who does the announcement impact? All private and public sector companies are urged to  act with urgency to ensure that critical infrastructure is secured and prepared against threat in…

Read More...

A Log4j retrospective

It was reported that 2021 was a  record year for zero-day exploits, and to many it has felt like a non-stop string of resource- and risk-intensive vulnerabilities to remediate. The Log4j exploit seemed to get more attention than others because of its pervasiveness in organizations, regardless of size or industry. While many articles, blogs, and…

Read More...

Why you should adapt the MITRE ATT&CK framework for threat intelligence

Cyber threat incidents continue to worsen with the adoption of remote technologies and the growing sophistication of attacks. Palo Alto Networks published a report in May 2021 indicating that attackers are getting faster at identifying and exploiting vulnerabilities immediately after they are published. The researchers observed that, between January and March 2021, adversaries began scanning…

Read More...

Save millions by upskilling your staff

How we helped a client save $2.5M by upskilling their staff Through small, strategic tech tips, our client was able to save at least $2.5 million annually, while creating a faster, more tech-savvy workforce. Capturing the ROI of a training program often feels elusive. Counting the number of “butts in seats” only refers to people…

Read More...

3 reasons why the Colonial pipeline hack is important

Colonial Pipeline, which carries roughly 45% of fuel consumed on the East Coast (per the WSJ), was shutdown on May 7th due to a cyber-attack. At time of writing, Colonial’s systems remain shutdown and Colonial is working to restore operations as researchers assess the damage. This is the biggest ransomware attack to date against United…

Read More...

How to visualize a security program

How to visualize a security program (in a way that is not overwhelming) It can be daunting to know how to properly secure your organization from the numerous risks that it faces. In the past, a business would simply need to lock up each night, but modern times have proven that information security breaches are…

Read More...

Which information security framework is right for my business?

There is no one-size-fits-all solution when it comes to information security frameworks and guidelines. Understanding all of the different security and risk frameworks can be daunting. This is a simplified guide intended to help you understand the basics of different information security frameworks, why you might need them, and how to go about choosing the…

Read More...

Navigating digital transformation & cybersecurity

The digital transformation wave is here, we’re in the middle of it, and cybersecurity needs to adapt matching the urgency, pace, and the delivery of new or improved digital products. Businesses are transforming across industries, focused on improving the quality and engagement of customer-facing products. cybersecurity needs to be a pressing concern that is ultimately…

Read More...

Data privacy- how to make it practical

How to make data privacy practical Learning how to make data privacy skills practical can lead to better outcomes for your organization. What actions are you taking to move beyond simple data privacy awareness and actually start applying data privacy principals? Below are 3 practical examples of how you can move from awareness to skill-building…

Read More...

Cybersecurity for your home

Security in your home might be a daily activity for you – keeping the kids, the dog, and the secret stash of chips safe. But what about your digital security (or cybersecurity), including precious details about you and your family? The addition of more work and school happening at home makes cybersecurity an even higher…

Read More...