United States Cybersecurity Magazine

ProcessBolt
From the Summer 2021 Issue

How to Decide a Safe and Suitable Business Model in a COVID-19 World for Your Business

Author(s):

Glenn Axelrod, M.Sc. IT, CISA, CISM, CRISC, Senior Information Technology Consultant , HKA Technology Solutions, L.L.C.

How to Decide a Safe and Suitable Business Model in a COVID-19 World for Your Business

Over the last ten years, remote work has increased by more than 100%; between 2017 and 2018, telecommuting increased by more than 20%. The COVID-19 pandemic altered our working environment, and some businesses discovered that they were unable to transition to a fully remote or hybrid workforce model. At the start of the COVID-19 pandemic, … Read more

The Principle of Least Privilege: The Whats, the Whys, and the Hows

Author(s):

Ameera Azeez, Product Specialist, ManageEngine

the-principle-of-least-privilege

According to a recent infographic, in 2020 more than 70% of cybersecurity breaches happened due to the misuse of privileges. This emphasizes the need for the enterprise-wide elimination of unnecessary privileges, which is exactly what the Principle of Least Privilege (PoLP) advocates. Here is a detailed breakdown of what this principle means for organizations and … Read more

Avoiding Rough Patches Using Patch Management

Author(s):

Aritri Saha, Content Writer, ManageEngine

Patch Management - Patches

Patch management is an essential part of sustaining IT services in this era of malware and growing cyber threats. Letting your guard down in network security makes your organization an easy target for cybercriminals. The responsibility for keeping the network safe and guarded is a herculean task, but automating the process can make any system … Read more

From the Winter 2021 Issue

Still Looking for Cyber Solutions for the Same Cyber Problems

Author(s):

Colby Proffitt, Cybersecurity Strategist, Netskope

Real Time Data

Real-time data, not more tools, critical to reduce risk and make better cyber decisions The job of the Chief Information Security Officer (CISO) has become much more complex over the last decade. With every advance in technology, the amount of risk facing most organizations has also increased. CISOs – as well as Chief Risk Officers … Read more

The Importance of Cybersecurity Training

Author(s):

Frankie Wallace, ,

Cybersecurity training is imperative to the success of any modern workplace. The work force has transformed over the years, as has the technology required to operate it. Digital transformations and full-scale transitions over to cloud infrastructures have meant large changes for organizations wishing to remain relevant while providing employees and customers with better overall experiences. … Read more

Cybersecurity Market: Trending Upwards

Author(s):

Josh Henry, ,

Cybersecurity Market coins in front of graph

Rising Cybersecurity Market Trends      The cybersecurity market is rapidly expanding in today’s society; and rightfully so. The steady increase in data breaches and threats to our identities show no signs of slowing down. Additionally, the demand for professionals in the cybersecurity market field is rapidly growing According to an article from Cybersecurity Ventures, the estimated … Read more