Cybersecurity

What is Zero Trust?

Zero Trust

There is no one-size-fits-all solution for security so the best way to lessen the threat surface is to implement a zero trust architecture.  To determine if pursuing a zero trust architecture is the right move for your organization, you need to understand its purpose, benefits and challenges. 

Read More

Survey Says: Compliance Programs Largely Immune to the Pandemic

Survey Says: Compliance Programs Largely Immune to the Pandemic

The business and compliance landscape seems to constantly evolve. Between new cybersecurity threats and the increasing use of a distributed workforce, it’s hard for organizations to ensure they’re staying on top of compliance requirements. And the COVID-19 pandemic made this more challenging. At least that’s what we thought. 

Read More

The Opportunities and Challenges Ahead: A Response to the Cybersecurity Executive Order 

The Opportunities and Challenges Ahead: A Response to the Cybersecurity Executive Order

President Biden’s Executive Order serves as an official and intentional first step to modernize cybersecurity defenses, especially as it relates to federal networks, and creating a more definitive response from the U.S. when incidents occur.  Here are a few opportunities and challenges we see ahead! 

Read More

Starting a new IT security policy? Consider these 8 key policies and procedures

8 key policies and procedures

Having the right set of IT security policies in place can help to prevent cyber-attacks and minimize risk.  Check out eight key policies and procedures your organization needs today.

Read More

How to Share Your Cybersecurity Assessment with Your Professional Community

Cybersecurity Assessment with Your Professional Community

A-LIGN’s SVP of Marketing, Brian Gladstein, has been sharing ideas and best practices for getting the word out about your cybersecurity assessment. As the final post in this series, Brian discusses sharing your cybersecurity assessment with your professional community and how to promote your commitment to their security.

Read More

The A-LIGN Advantage: Unify Your Audit Experience across Multiple Standards with a Single-Provider Approach

The A-LIGN Advantage: Unify Your Audit Experience across Multiple Standards with a Single-Provider Approach

The emergence of automated security and compliance solutions still leaves organizations with a problem: these point solutions are unable to provide independent third-party certification.

Read More

Three Best Practices to Prevent a Supply Chain Attack at Your Organization

Three Best Practices to Prevent a Supply Chain Attack at Your Organization

The SolarWinds supply chain attack rocked governments and businesses alike in late 2020. Help keep your organization safe with these three key steps.

Read More

CMMC: Expert Advice on Cybersecurity Certification Next Steps

WS_CMMC_Webinar_Recap_1-0

The recent release of the Interim DFARS rule has raised a lot of concern and questions among U.S. Department of Defense (DoD) contractors.

Read More

Humans Hacking Humans: 4 Lessons from Twitter

Humans Hacking Humans: 4 Lessons from Twitter

Three people were charged for their alleged roles in what the Department of Justice has called an attack on “one of the world’s most prolific social media platforms.”

Read More

Security Risk
Poses Challenge to
Remote Work

Security Risk Poses Challenge to Remote Work

In the past several months, organizations were forced to quickly adapt to “the new normal” of employees working from home on personal devices, while connecting to corporate networks and accessing enterprise assets.  That organizational scenario can be a compliance nightmare, assuming the associated security risk doesn’t already keep you up at night.

Read More