How to Implement Zero Trust Pragmatically

When implementing Zero Trust in today’s cybersecurity landscape, it’s easy to become entangled in the complex strategies and advanced technologies that often dominate the conversation. While the latest methods, like Zero Trust, play a crucial role, it’s essential to recognize that they are just one piece of a much larger cybersecurity puzzle. Drawing from the…

Read More

The Hidden Dangers of Software Shortcuts: Lessons from CrowdStrike

In the fast-paced world of software development, shortcuts are often tempting. However, taking shortcuts can lead to significant risks, as evidenced by recent incidents involving CrowdStrike and end users rolling out software updates. When proper controls and processes are not followed—especially the critical stages of design, build, test, and deploy—both security and functionality are compromised.…

Read More

Shadow IT

Shadow IT while always problematic for IT Departments has recently resurfaced as a real and present threat and risk to an organization and in particular, has become a focal area during FDIC examinations.     So, what does Shadow IT mean? Shadow IT (a.k.a., “unauthorized technology,” “unauthorized assets,” “unauthorized devices,” etc.) has created quite a name…

Read More

ITIL Integrates Technology Into Your Company’s DNA, But Only If Done Right

Information technology is a primary driver of numerous business activities, creating value through efficiencies and increased opportunities. However, many businesses still find it challenging to effectively manage their IT departments, especially in light of security concerns, and view technological solutions as issues that must be managed only by the IT department. By integrating technological solutions and…

Read More