Contact

Asset Owner Identification Automation for Vulnerability Management

A major Communications & Media company faced a large number of long-lived vulnerabilities in their service delivery network for which the asset owner was unknown. Without an asset owner for whom to turn for remediation, each day the situation was going from bad to worse. Their existing manual ownership identification processes were hopelessly overwhelmed by […]

Read More
icon / insight Created with Sketch.
Insight

Securing the Hybrid Working World

As a result of Covid, a rapid organizational shift to a new way of working is well underway, and almost three years into this transformation, companies are still wrestling with the transition to a hybrid work environment. As we continue to learn more about the impacts of these recent organizational changes, leaders are now focused […]

Read More
icon / insight Created with Sketch.
Insight

Messy IT Asset Management: Unorganized Closet or Fire Starter?

IT Asset Management is often the un-owned, unwanted, and un-optimized major initiative that large technology organizations continue to struggle with — especially in a modern ecosystem of hybrid infrastructure, legacy systems, microservices, and DevOps teams. Is this simply a commonly ignored housekeeping exercise or is it a signal of a huge cybersecurity risk? The latest […]

Read More
icon / insight Created with Sketch.
Insight

A Summary of the U.S. Department of Treasury’s Report “The Financial Services Sector’s Adoption of Cloud Services”

The U.S. Department of Treasury recently released “The Financial Service’s Sector’s Adoption of Cloud Services” (“Cloud Report”), outlining key issues facing the U.S. financial services industry as it adopts cloud services. Forty-eight organizations, including global banks, participated in the “open discussion without attribution focused on the current and future state of cloud adoption, viewpoints on […]

Read More
icon / insight Created with Sketch.
Insight

Four Cybersecurity Trends to Watch in 2023

As 2023 approaches, it is time to look into our crystal ball for trends that will define cybersecurity over the next year. With many CEOs expecting possible economic downturn in the next 12 months, it’s impossible to not consider the larger macro environment when making these predictions. While recessions typically lead to cost-cutting across companies, […]

Read More
icon / insight Created with Sketch.
Insight

DEFCON 30 Recap

DEFCON is an experience that covers a breadth of security topics from Lock Picking to International Cyber Policy and Security. After spending a jam-packed weekend in Las Vegas, the DayBlink Consulting Cybersecurity Group gathered key takeaways with security practitioners and IT executives in mind. Read more here: Zachary White on Medium About the Authors Zachary […]

Read More
icon / insight Created with Sketch.
Insight

Summary of the January 2022 Memo on Federal Zero Trust Strategy

Given the vast amount of data the United States maintains, the federal government has a unique responsibility to secure its own IT infrastructure to minimize the potential harm from a cyber intrusion. With persistent and inventive threats from bad actors in mind, the Biden Administration announced it is moving toward a Federal Zero Trust Architecture […]

Read More
icon / insight Created with Sketch.
Insight

Technical Controls as a Driver of Cyber Culture

Most sophisticated cybersecurity organizations have embraced technical controls as a management mechanism. Some organizations have even begun mandating their adoption. Forced technical controls, if integrated appropriately into the culture, can dramatically increase cyber defense capabilities as well as combat employees’ inherent resistance to change. While proactively initiating change may seem counterintuitive to creating a strong […]

Read More
icon / insight Created with Sketch.
Insight

Prevent and Detect Lateral Movement: How Organizations Can Adopt Guidance from the NSA & CISA’s “Security Guidance for 5G Cloud Infrastructure”

This October, the National Security Agency (NSA) and the Cybersecurity and Infrastructure Security Agency (CISA) published the first of a four-part series of position papers called “Security Guidance for 5G Cloud Infrastructure.” The first part, “Prevent and Detect Lateral Movement,” outlines five actions to prevent threats while building and hardening 5G cloud infrastructure. Although this position paper is specifically […]

Read More
icon / insight Created with Sketch.
Insight

Attracting and Retaining Talent through Career Empowerment

For the first time in nearly two decades, it is a job seeker’s market, and organizations are scrambling to reassess compensation packages and working arrangements to accommodate shifting employee priorities, win in the battle for talent, and avoid the “Great Resignation.” Fewer companies, however, have focused efforts on the longer-term strategies that are critical to […]

Read More