Stay on the cutting edge of cybersecurity's evolution and global insight! Subscribe to The Nexus for FREE today!

Train Barefoot Doctors in Your Organization

By Rob Lelewski, CISA, CRISC, CISM, CCE, CISSP-ISSMP, EnCE, GCIH

The Nexus  |  11 Jun 2018

In the mid-20th century, rural China lacked basic healthcare services. This occurred for a variety of reasons, but the end result was obvious: without basic healthcare services, the ability to treat simple illnesses or educate the population on proper hygiene or family planning was limited or...

PKI Explained: Why It Is Necessary and Relevant Now More Than Ever

By Mark B. Cooper

The Nexus  |  14 May 2018

Unauthorized access, unsigned applications (malware) and unsecured email. What can help prevent these top 3 cyberthreats impacting organizations today? Public key infrastructure (PKI). PKI enables a trusted environment by authenticating and ensuring the integrity of data and users. The word...

Three Milepost Markers on the Road to PCI Compliance

By Tyler Hardison, CISSP, PCI Qualified Security Assessor

The Nexus  |  12 Mar 2018

Compliance is a journey, not a destination—an ongoing, multistep process. It is not boxes to check off—check it and forget it—but milepost markers along the way to ensure that compliance is consistent, such as ensuring that device inventories and configuration standards are kept up to date....

Two Common Choke Points in the Incident Response Process

By Rob Lelewski, CISA, CRISC, CISM, CCE, CISSP-ISSMP, EnCE, GCIH

The Nexus  |  12 Mar 2018

Many organizations simply do not have the luxury of maintaining an in-house incident responder or incident response staff. This leaves the organization with 2 options: Call in support from a vendor. Attempt to address the incident with internal staff. This article explores the initial technical...