SolarWinds and SUNBURST: The Technical Risks of State-Sponsored Terrorism

solarwinds hack bug

The news cycle for anyone connected with cybersecurity has been dominated by information regarding the SolarWinds hack. This breach, starting with a single cloud and security provider, has now become a national emergency as more and more private institutions have become infected with potentially dangerous results.

As this situation unfolds, we wanted to touch base and provide background into the underlying methods and strategies used by the hackers. Following that, you can see how the attacks took place not just because of vulnerabilities in a system, but through an interconnected network of systems made vulnerable by one vendor. Finally, we provide some basic concepts to consider for your company’s security moving forward. 

Read More

What is Compliance Process Automation?

compliance process automation

Modern businesses are data-driven, and that fact has put compliance and data governance at the forefront of contemporary security and IT support. With so much information, much of it pertaining to private consumer issues like finances, health, and Personal Identifiable Information (PII), it’s imperative for businesses to comply with regulations that protect that data from theft or unlawful viewing. That’s why businesses are turning to compliance process automation to make auditing and reporting faster, more efficient, and more accurate. 

Read More