This blog will explore the real-world utility of cryptocurrencies from the perspective of a crypto optimist.
Securing the Metaverse
The metaverse has become a hot topic in technology and investing spheres. However, this new medium, in which people can connect online in enhanced ways, can open up new attack surfaces for cybercriminals. As the vision of the metaverse becomes better defined it is clear that security and privacy will be major factors in its adoption.
IT Security Governance
IT security is not about protecting IT, it’s about protecting the business, organization, or mission.
IT Security Governance links business risks to IT risks and threats. No IT control should be implemented without being able to tie back to a business risk it is helping to manage, mitigate, or reduce its impact.
Is CMMC the business enabler that CISO’s need?
The Defense Industrial Base (DIB) is under constant threat of cyber warfare activities by cybercriminals and state-sponsored actors. To help prevent losses of intellectual property and CUI, SEI researchers helped the federal government develop CMMC, a program built upon established cybersecurity standards and best practices to reduce the risk of cyber threats in the DIB.