NIST Cybersecurity Framework: Fifth, Iterate and Adapt
Josh Mayfield
NIST Cybersecurity Framework: Fifth, Iterate and Adapt

We come at last to the final stop on our journey to implement the NIST Cybersecurity Framework (CSF). In previous posts, we’ve looked at how to identify, protect, detect and respond to security risks. Here, with the final pillar of the NIST CSF, Recover, we get a chance to reflect on what has happened and incorporate that new knowledge to improve our people, process, and technology for greater cyber...

READ MORE
How Wichita State University Improved Endpoint Visibility & Control
Juanma Rodriguez
How Wichita State University Improved Endpoint Visibility & Control

Long gone are the days when institutional data sits within a single, secure perimeter. Sensitive information now resides on multiple mobile endpoints handled by users who are constantly making changes to them. As more and more higher education institutions adopt 1:1 device programs, the challenge of securing that data only amplifies. Wichita State University (WSU), a public university in Wichita, Kansas that serves about 15,000 students, has experienced a...

READ MORE
5 Back-to-School Security Tips for K-12
Juanma Rodriguez
5 Back-to-School Security Tips for K-12

It’s back-to-school season and while students and their families shop for new clothes, backpacks and school supplies, teachers and administrators are also busy outfitting their schools with tools to support a productive and safe school year. There’s no question technology is a core component for creating powerful learning environments. Seventy-five percent of teachers today use technology in their classrooms on a daily basis. But with technology adoption comes risks...

READ MORE