Blog

Turnkey solutions based on a holistic Zero Trust Security framework, at a fraction of the cost for a typical security engineer / managed service provider.

Threat Modeling – 6 Steps for Secure Data Assets

https://threatmodeler.com/six-steps-to-threat-modeling-for-secure-data-assets/ NOTE: Practical examples and more information is available at MITRE ATT&CK: https://attack.mitre.org/resources/getting-started/ Threat modeling is the process of adopting a strategic, risk-based approach to

Read More

CIS Top 18 Controls (2022)

The 18 CIS Critical Security Controls Formerly the SANS Critical Security Controls (SANS Top 20) these are now officially called the CIS Critical Security Controls

Read More

CIS RAM (Risk Assessment Management)

CIS RAM conforms to and supplements established information security risk assessment standards and methods, such as ISO 270051, NIST Special Publications 800-302, and Risk Information

Read More

CISSP – 8 domains

Domain 1: Security and risk management (GRC) The security and risk management domain covers general concepts in information security. Candidates are evaluated on skills related to the

Read More

Prodigy 13 Newsletter

Sign up for our monthly newsletter for business leaders on minimizing cybersecurity risk.