The SolarWinds supply chain attack rocked governments and businesses alike in late 2020. Help keep your organization safe with these three key steps.

I recently wrote an article for Dark Reading about the massive supply chain attack perpetrated via vulnerabilities in SolarWinds, Microsoft, and other leading vendors. …


Source: Joseph Mucira from Pixabay

President Biden’s Executive Order serves as an official and intentional first step to modernize cybersecurity defenses, especially as it relates to federal networks, and creating a more definitive response from the U.S. when incidents occur. Here are a few opportunities and challenges we see ahead!

On May 12, 2021, President…


Source: Stefan Coders from Pixabay

Understanding the Real-time Need of Cybersecurity Tools.

Cybercrimes and cybersecurity breaches with data protection service are getting profound as the world becomes hyper-modern with technology. Along with the multiple cybersecurity steps adopted and implemented to counter cyberattacks, it is also important to have a deep understanding of the cybersecurity tools that can help in countering cyber breaches.


Image source: Pixabay

In recent years, ‘compliance’ has become a bit of a buzzword within the cyber security sphere. However, whilst companies have been concerning themselves with ticking regulatory boxes, they have lost sight of the outcome.

Compliance measures if a control is in place, but it does not measure the effectiveness of…


Image by xresch from Pixabay

In recent years, ‘compliance’ has become a bit of a buzzword within the cyber security sphere. However, whilst companies have been concerning themselves with ticking regulatory boxes, they have lost sight of the outcome.

Compliance measures if a control is in place, but it does not measure the effectiveness of…


image source

The Cybersecurity Maturity Model Certification (CMMC) is the Department of Defense’s (DoD) newest verification mechanism designed to ensure that cybersecurity controls and processes adequately protect Controlled Unclassified Information (CUI) that resides on Defense Industrial Base (DIB) systems and networks.

The DoD implemented requirements for safeguarding Covered Defense Information (CDI) and…

Mitesh Patel

I bridge the gap between the challenges businesses are facing today and their potential success through custom built strategies: https://a-lign.com/

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store