The Vault

What are IDS/IPS?

As an information security officer, you must know what IDS and IPS stand for. We will be defining these terms in this article and explaining why they are significant to your role.  Knowing all about these tools will help you make the best choice when purchasing one for yourself. So, let’s get started! The following…

Read more

Zero Trust Models For Hybrid Work Force

If you think it’s infuriating when an app doesn’t allow you to save passwords, email addresses, shipping addresses, or other credentials, you probably need this deep-dive into the world of Zero Trust.  In the technological context, Zero Trust may sound pretty much like something straight out of a sci-fi thriller. The reality isn’t far off,…

Read more

CMMC Compliance With Microsoft Azure

Probably of the most talked about topics this year has been about the Cybersecurity Maturity Model Certification, also known as the CMMC. This is essentially where all of the contractors and subcontractors from the Defense Industrial Base (DIB) must come into some sort of certification level in order to have the ability to bid on…

Read more

How To Protect Against Ransomware

This year has definitely been one of the most challenging ones for Cybersecurity, especially when it comes to Ransomware. There probably been more attacks in this regard than ever before. Although certain industries have been targeted, in the end, nobody is immune from it, and any entity can become a victim. The key is in…

Read more

CUI Classification Guide

Directives for Controlled Unclassified Information (CUI) have left numerous organizations confused about classifying their information. An executive order 13556 by President Obama on 4th November 2010 established the CUI program. Laws and regulations binding CUI was issued so that policies that dictate how CUI could be used, safeguarded, designated, disseminated, marked, decontrolled, disposed of, or…

Read more