AS SEEN ON: As Seen On Logos KRQE Logo

Thoughts From The Deck

Zero Trust

These days, when you hear discussions about cybersecurity, the term zero trust comes up in a lot of the conversations. So thought we should explore what zero trust really is, what it means, and how it could help protect us ...

AI Based Social Engineering Attacks

But now we're seeing a huge surge of AI powered social engineering attacks hitting all parts of the business world. Although AI has brought some wonderful benefits and advancements to the world of business, it's also introduced huge new cybersecurity ...

Thoughts from Marco Island

Coming to you from a distant deck at Marco Island, Florida. Again, cheers. After I got here to Marco Island, I had the opportunity to be a contestant on Cybersecurity Jeopardy! With our host Miles Walker, whom many of you ...

Thoughts Concerning Kaseya Global Connect

Coming to you from a distant deck at Marco Island, Florida, today. Cheers. I just spent the last week at the Kaseya Global Connect Conference getting updates on the current technology landscape from Fred Voccola, CEO for Kaseya. Gary Pike, ...

Fiesta

As many of you know, it's fiesta time here in San Antonio, so I thought I'd kick off today with a wine glass and some festive multicolor lights on the bottom. Many of you may not know it, but Fiesta ...

Don't Brind A Sword To A Gun Fight

You'll probably notice that I toasted you with a wine chalice, and this hat is very similar to the one that Indiana Jones wears. Now, you might remember the statement that Indiana Jones made Don't bring a sword to a ...

What Is Cybersecurity Compliance

The big question today is what is cybersecurity compliance? When researching this, I found a very formal definition saying that cybersecurity compliance is, at its core adhering to standards and regulatory requirements set forth by some agency law or authority ...

Successful Compliance Book Launch

I'm excited to let everyone know that my book, the Compliance Formula, Successful Strategies of CMC Compliant Companies, had a very successful launch last Thursday and achieved Amazon number one best seller. I really appreciate all of you that supported ...

NIST SCF Recover Function

This week, we'll finish our brief overview of the cybersecurity frameworks. Five High level Functions. So far, we've briefly discussed the identify, protect, detect, and respond functions. The fifth high-level function we need to discuss is the recover function. And ...

NIST CSF Detect and Respond

Last week we briefly discussed the identity and protect functions of the cybersecurity framework. This week we'll continue going through the framework with a discussion about the detect and respond functions. Detect is just that we must develop and implement ...

Contact

TechSage SolutionsTechSage Solutions Logo $$$