Contact

Asset Owner Identification Automation for Vulnerability Management

A major Communications & Media company faced a large number of long-lived vulnerabilities in their service delivery network for which the asset owner was unknown. Without an asset owner for whom to turn for remediation, each day the situation was going from bad to worse. Their existing manual ownership identification processes were hopelessly overwhelmed by […]

Read More
icon / insight Created with Sketch.
Insight

Enhancing Supply Chain Efficiency Through JIT & Process Refinements

A Supply Chain is a network of organizations, people, processes, and resources involved in the production and delivery of products or services to an end consumer. This network involves a flow of goods which can involve procurement of raw materials, manufacturing, storage, distribution, delivery to customers, and recovery of goods. But, Supply Chain is more […]

Read More
icon / insight Created with Sketch.
Insight

The SEC’s Cybersecurity Incident Reporting Rule and What It Means to Your Company

Starting today, the SEC’s Cybersecurity Incident Reporting rule requires all publicly traded companies to report material cybersecurity breaches within four days. Companies must include standardized information to ensure consistent reporting of these incidents to the public. Like all SEC rules, there are financial penalties for non-compliance so company leadership should know how to respond when […]

Read More
icon / insight Created with Sketch.
Insight

The Future of Work with AI: Benefits, Limitations, and Ethical Concerns

The integration of Artificial Intelligence (AI) into the workplace marks a significant transformation in how tasks are performed and managed. While the landscape of AI has its limitations and ethical concerns, AI’s potential in the workplace is considerable and has the capability to automate a substantial portion of the average workday. Learn more here: Josh […]

Read More
icon / insight Created with Sketch.
Insight

How to Build Culture in a Hybrid Work Environment

As we continue to operate in a hybrid model, organizations are stuck. Virtual is not providing a space for efficient working conditions nor growing company culture, and going into the office is creating a disgruntled employee base. While both options are optimal for some, the availability of choice has created friction. Many have landed on […]

Read More
icon / insight Created with Sketch.
Insight

SOC Automation: Trends and Best Practices

Automation has become essential in modern SOCs to ensure efficient detection, remediation, and response to security incidents. Successful automation, however, requires a strategic approach that incorporates both technology and human collaboration. Identifying strategic elements in advance can increase your probability of success. Learn more here: Josh Tupper on Medium. About the Authors Josh Tupper is […]

Read More
icon / insight Created with Sketch.
Insight

The IAM Iceberg: Navigating IAM’s Depths Amidst the Temptation of Tools

A quick Google search using keywords like “how to scale identity and access” or “how to securely manage identity and access” will yield a plethora of results addressing common Identity and Access Management (IAM) challenges. Notably, many of these results are dominated by companies that offer enterprise IAM products such as SailPoint and Okta. Their […]

Read More
icon / insight Created with Sketch.
Insight

Identifying and Addressing Top Automation Opportunities in Fortune 500 Companies

Harnessing automation to perform tasks that traditionally require human intervention is more than a passing trend, it’s a transformative shift. Successful automation can lead to significant financial and operational benefits, including a decrease in operational costs, fewer errors, and an optimized allocation of resources. Learn more about the five criteria business leaders should examine to […]

Read More
icon / insight Created with Sketch.
Insight

GitHub — a Dangerous Platform if your house isn’t in order

Every year, hacker summer camp (aka DEFCON, Black Hat, BSides) arrives in a flurry of anticipation, presentations, and great ideas that often take reflection to determine how best to implement in our daily lives. Each year, in addition to new skills and information, we look for themes that may come to dominate the security world […]

Read More
icon / insight Created with Sketch.
Insight

Prioritizing the Virtual Private Cloud for PHI in Healthcare

Cloud infrastructure systems present an incredible opportunity for healthcare organizations to not only greatly save on costs, but also securely transfer patient data faster and more securely (when done right). In DayBlink Consulting’s new thought piece, Christa Zubic assesses the various options healthcare organizations can pursue in upgrading their cloud offerings, specifically focusing on how […]

Read More