Shadow IT: Google Chrome Remote Desktop
I’ve seen quite a bit of Google Chrome Remote Desktop in the wild as of late, and to me it presents some challenges worth talking…
I’ve seen quite a bit of Google Chrome Remote Desktop in the wild as of late, and to me it presents some challenges worth talking…
“An ounce of prevention is worth a pound of cure.” Here are some useful bits of info that might help justify cybersecurity program improvements: According…
For quite some time this has been difficult to find. NIST SP 800-171 and the CMMC require the use of FIPS validated cryptography when protecting…
For those looking for information on CUI training or additional CUI resources, here are a few helpful links: DoD Mandatory Controlled Unclassified Information (CUI) Training…
Background You might see it referred to as 2FA, MFA, or 2-step, but it all refers to having an additional authentication mechanism when we log…
IT professionals and power users employ all sorts of utilities for daily tasks. Often, a quick search will suggest several options that might work for…
A great example popped up today regarding truly effective vulnerability management. Many businesses have automated patching tools, and some may be under the impression that…
Having recently attended the ISOO’s CUI Fundamentals of Marking course, I would recommend data owners, compliance officers, and others follow the CUI Program Blog and…