-
FIPS 140-2 and CMMC Compliance
What is FIPS 140-2? Federal Information Processing Standards Publication 140-2 is a standard for the cryptographic modules used in software and hardware to protect sensitive data. The key…
4 min read
-
The CrowdStrike Outage: Risk Assessments & Single Points of Failure
On July 19, 2024, what should have been a routine update meant to improve CrowdStrike’s Falcon Sensor software ended up causing chaos. Instead of enhancing the endpoint detection…
4 min read
-
Baseline Configurations: The First Step in Configuration Management
The Configuration Management (CM) domain in NIST SP 800-171 requires organizations to create and maintain baseline configurations and inventories for all their systems that includes hardware, software, firmware,…
4 min read
-
Multi-factor Authentication (MFA) and How to Thwart Bypass Attacks
Multi-Factor Authentication (MFA) significantly strengthens security for businesses and individuals by adding extra layers of verification before granting access to accounts or devices. Instead of relying on just…
4 min read