Badge Life: The CISO Team Takes on DEF CON

Badge Life: The CISO Team Takes on DEF CON

The CISO Global Pen Testing Team Earlier this month, a group of our intrepid pen testers from our Readiness & Resilience team at CISO Global ventured into the heart of the hacking ...

Novel Threat Tactics, Notable Vulnerabilities, and Current Trends for July

Every month, the Pondurance team hosts a webinar to keep clients current on the state of cybersecurity. In July, the team discussed threat intelligence, notable vulnerabilities and trends, security operations center (SOC) ...
A Crash Course on Hyperproof’s GRC Maturity Model

A Crash Course on Hyperproof’s GRC Maturity Model

Something has been missing in the governance, risk, and compliance (GRC) space: the ability to truly understand an organization’s GRC maturity and the steps it would take to build the business case ...
The Polar Bear in Your Kitchen: A Cybersecurity Analogy

The Polar Bear in Your Kitchen: A Cybersecurity Analogy

Chris Clements, VP of Solutions Architecture at CISO Global High-Tech Pest Control = Threat Detection & Response Imagine for a moment that your home has a rodent problem. To address this, you ...
How Audit Procedures and Internal Controls Improve Your Compliance Posture

How Audit Procedures and Internal Controls Improve Your Compliance Posture

As businesses enhance their risk management techniques, the importance of efficient audit procedures and robust internal controls cannot be overstated. Audit procedures are used by audit teams to identify and assess risks ...
The Cybersecurity Industry is Under Scrutiny Yet Again

The Cybersecurity Industry is Under Scrutiny Yet Again

Jerald Dawkins, PhD, Chief Technology Officer at CISO Global  In the weeks following the CrowdStrike global tech outage, cyber companies and their end-users alike are evaluating their incident response plans. It likely ...

Novel Threat Tactics, Notable Vulnerabilities, and Current Trends for June 2024

Every month, the Pondurance team hosts a webinar to keep clients current on the state of cybersecurity. In June, the team discussed threat intelligence, notable vulnerabilities and trends, threat hunting, security operations ...
Everything You Need to Know About the FFIEC

Everything You Need to Know About the FFIEC

It’s no secret that the financial sector is one of the most highly regulated industries in the United States. Given the wide range of regulatory agencies that exist, who makes the rules? ...

CrowdStrike Update Created Widespread Outage

As a recap, a widespread Microsoft Windows outage began on July 19 and expanded throughout the day due to a CrowdStrike content update for Microsoft Windows hosts. Pondurance and its systems were ...
Hyperproof Sweeps G2 Summer Awards (Again)

Hyperproof Sweeps G2 Summer Awards (Again)

It’s summer, so it’s time for some sun — and another round of G2 awards! This time, Hyperproof was in the top 10 in 64 categories and brought home 32 awards, a ...

Application Security Check Up