Federal Desktop Core Configuration (FDCC) was mandated by the US Office of Management and Budget (OMB) in 2007 and provides a set of security standards that must be adhered to by all federal workstations and laptops running Windows XP or…
Tag: Blog RSS Feed
VanHelsing Ransomware: What You Need To Know
What is the VanHelsing ransomware? First reported earlier in March 2025, VanHelsing is a new ransomware-as-a-service operation. Oh, so it’s a relatively new player on the malware scene, then. Why the concern? At least three victims of VanHelsing have already…
How to Build a Mature Vulnerability Management Program
The terms “patch management” and “ vulnerability management“ are not the same. And that difference is a big difference. They may be confused because applying patches is one of the many ways to mitigate cyber risks. However, it is one…
Implementing Privileged Access Workstations: A Step-by-Step Guide
At a time when cyber threats seem to escalate daily, security teams are always on the lookout for new ways to protect their sensitive data and systems. For some, Privileged Access Workstations (PAWs) are being viewed as one solution to…
MAS Compliance 101: Key Regulations for Financial Institutions in Singapore
The Monetary Authority of Singapore (MAS) is both the central bank and chief financial regulator of Singapore. As such, they publish best practices (“Guidelines”) and legally binding regulations (“Notices”) regarding technology risk management and cyber hygiene. Mandatory requirements include: Notice…
An Introduction to Data Masking in Privacy Engineering
Protecting individual privacy is paramount, given the proliferation of Personally Identifiable Information (PII) and other sensitive data collected by enterprises across all industries. One way to protect sensitive data is through PII masking e.g., consistently changing names or including only…
Top 10 Scam Techniques: What You Need to Know
Scammers are highly resourceful and cunning when devising new ways to swindle people. But they often rely on long-standing persuasion techniques for their tricks to work. So, you may hear about a new scam that uses a novel narrative, but…
Cross-Border Data Compliance: Navigating Public Security Regulations in a Connected World
It is a significant benefit that the world is connected the way it is, with the potential for even greater interconnectivity. However, this has come at huge costs, too, considering the rise in the direct involvement of state actors engaged…
BlackLock Ransomware: What You Need To Know
What is the BlackLock ransomware? BlackLock is a relatively new ransomware group. First seen in March 2024, the ransomware operation initially operated under the name El Dorado, before rebranding as BlackLock late last year. BlackLock follows a RaaS (ransomware-as-a-service) business…
CMS ARS: A Blueprint for US Healthcare Data Security and Compliance
Protecting sensitive patient information is more critical than ever. With technologies evolving at a breakneck pace and the number of cyber threats targeting healthcare entities in the United States skyrocketing, healthcare organizations must have robust policies and guardrails in place…