Blog

Turnkey solutions based on a holistic Zero Trust Security framework, at a fraction of the cost for a typical security engineer / managed service provider.

Cyber Kill Chain (and Pros/Cons)

The cyber kill chain is an adaptation of the military’s kill chain, which is a step-by-step approach that identifies and stops enemy activity. Originally developed

Read More

SOC 2 vs HIPAA

1. Breach notifications SOC 2 has no specific breach notification requirements, but HIPAA sure does. HIPAA’s breach notification rule specifies how and when to notify

Read More

SIG, CAIQ, CCM and STAR

https://www.thirdpartytrust.com/blog/caiq-vs-sig-top-questionnaires-vendor-risk-assessment/ https://cloudsecurityalliance.org/research/cloud-controls-matrix/ (CSA) https://sharedassessments.org/sig/ Risk assessments, security questionnaires, vendor due diligence, and RFPs are strategic initiatives for organizations managing risk across growing and interconnected supply

Read More

MITRE ATT&CK Tactics (Briefs)

The Adversarial Tactics, Techniques, and Common Knowledge or MITRE ATT&CK is a guideline for classifying and describing cyberattacks and intrusions. It was created by the

Read More

SaA – Complete Annex A

      REG – Control related to regulatory / certification requirement CON – Control required due to contractual obligations BP – Control needed according

Read More

Prodigy 13 Newsletter

Sign up for our monthly newsletter for business leaders on minimizing cybersecurity risk.