Leveraging NIST's Cybersecurity Framework (CSF) and SPHEREboard to Achieve HIPAA Compliance
Shaping Cybersecurity For Healthcare NIST’s Role in HIPAA Compliance As organizations in the healthcare sector navigate the ever-evolving landscape of cybersecurity threats. Adhering to established ...
Identify Your Identities: Bob Smith is not BSmith
Understanding the distinction between an individual’s identity and their account(s) is more than a matter of semantics—it's a critical component of Identity Hygiene and a robust cybersecurity program.
Six Hidden Active Directory Risks that Could Leave You Vulnerable
If you work in enterprise IT, or even better, on an enterprise IT security team, you know your organization probably has an ocean of end users, accounts, and groups. With the rising prevalence of ...
Three Reasons Why Your Company Needs Robust Identity Hygiene and How to Implement It
SPHERE’s CEO & Founder, Rita Gurevich, was featured in Forbes Councils newest publication “Three Reasons Why Your Company Needs Robust Identity Hygiene and How to Implement It” With the increase ...
The Essential Role of Cyber Hygiene in Cloud Security
While moderating a recent conference panel session of Chief Information Security Officers (CISOs), I posed a question about their primary protection strategies as they transition infrastructure to ...
Mastering Data Governance: A Practical Guide for Enterprises
Data Governance: Implementing a Functional Strategy Data governance has emerged as a critical discipline for enterprises. By exercising positive control over data management processes, organizations ...
Regional Banking Security Roadmap: Navigating to $10 Billion
Regional Bank Data Security: Your Roadmap to $10 Billion and Beyond As regional banks grow towards the $10 billion asset mark, they face increasing scrutiny and challenges related to information ...
Strengthening Active Directory Group Management with SPHERE
Active Directory (AD) groups play a crucial role in providing access to organizational resources such as data, applications, and systems. Managing these groups effectively is essential for bolstering ...
Unlocking the Potential of Active Directory: A Comprehensive Evaluation
Unlocking the Potential of Active Directory: A Comprehensive Evaluation In an era where IT infrastructure forms the backbone of corporate efficiency and security, the significance of Active Directory ...
Privileged Access Management: Filling The Gaps
Even with the understanding that privileged access is complex, knowing which accounts to password vault and where to escalate and record sessions requires multiple foundational workstreams before an ...
Improved IAM and Vaulting Reporting
One of the major obstacles IAM and vaulting solutions face is the quality of the data they rely on to be effective. It’s a basic tenet of IT security: Bad data in equals bad data out. Understanding ...
Pressing Forward: The 'Simple Button' of Automating File Remediation
The dawn of 2020 ushered in an era of unprecedented change, as COVID-19 swept across the globe, transforming our collective paths. This global upheaval forced the business world into a state of flux, ...