Featured Posts

In the Cloud with Microsoft Azure’s Chief Security Advisor

In the Cloud with Microsoft Azure’s Chief Security Advisor

In this episode of Security on Cloud Podcast, Mark McIntyre, Chief Security Advisor for Microsoft Azure, joins us and shares about his hands-on experience helping Microsoft's US government customers move confidently to the cloud while securing their legacy IT systems....

Is StateRAMP for You? Here Are a Few Facts Worth Knowing

Is StateRAMP for You? Here Are a Few Facts Worth Knowing

If you're a cloud software vendor who wants to sell — or has already sold — to federal government agencies, it’s likely that you’re already aware of FedRAMP compliance. But cyberattacks aren’t just limited to the federal government.   With more people working from...

Anitian Wins Seven Coveted Global InfoSec Awards at RSA Conference 2021

Anitian Wins Seven Coveted Global InfoSec Awards at RSA Conference 2021

Anitian named top cybersecurity company in seven categories, including Publisher's Choice Security Company of the Year, Editor's Choice in Cloud Security, and Hot Company in Cloud Security Automation. Link to release via PR Newswire RSA CONFERENCE, SAN FRANCISCO — May...

All Posts

NIST 800-53 r4 TOC

What’s New in NIST 800-53 R5

The new NIST 900-53 Revision 5 is out, and we look at the changes ...
Read More
ISO 27001 - Part 3 - The Audit

ISO 27001 – Part 3 – The Audit

ISO 27001 audits are not like other kinds of security assessments ...
Read More
ISO 27001 - Part Two - Building an ISMS

ISO 27001 – Part Two – Building an ISMS

Learn the six steps to building an ISO 27001 ISMS ...
Read More
ISO 27001 Compliance - Part 1 - The Fundamentals

ISO 27001 Compliance – Part 1 – The Fundamentals

ISO 27001 compliance is rapidly become a model standard for organizations wishing to demonstrate security diligence in a global market ...
Read More
Webinar Video: The Art of Writing for Cybersecurity - Anitian

Webinar Video: The Art of Writing for Cybersecurity

In this webinar, we share our strategies to dramatically improve the readability (and therefore the acceptance) of your security policies. We ...
Read More
Webinar Video: Future SOC: Security Operations in 2020 - Anitian

Webinar Video: Future SOC: Security Operations in 2020

Indiana Jones has nothing on a CISO. The adventure to build a Security Operations Center (SOC) is not for the faint ...
Read More
The Road to SOC2

The Road to SOC2

SOC2 compliance is a must-have for SaaS companies. Anitian’s VisionPath compliance team looks at your road to SOC2 compliance ...
Read More
Hardening iOS - Anitian

Hardening iOS

Hardening the Apple iPhone and iPad is easier thanks to a new benchmark from the Center on Internet Security ...
Read More
Hacking Avaya

Hacking Avaya

Discovery of Avaya servers in an network is consistently as target rich environment for hacking ...
Read More
Red Team Penetration Testing - Fallout (Part 3 of 3) - Anitian

Red Team Penetration Testing – Fallout (Part 3 of 3)

What can we learn from our recent red team penetration testing results about the state of information security in 2017 ...
Read More
Red Team Penetration Testing – Going All the Way (Part 2 of 3)

Red Team Penetration Testing – Going All the Way (Part 2 of 3)

The further chronicles of Anitian’s red team testing. Armed with a single stolen user account, we completely compromise a corporate network ...
Read More
Red Team Penetration Testing - Anything Goes (Part 1 of 3) - Anitian

Red Team Penetration Testing – Anything Goes (Part 1 of 3)

Chronicle of a recent red team penetration test from Anitian’s Ring.Zer0 team that shows how a dedicated attacker can bypass even ...
Read More
Goodbye Yellow Brick VAR - Anitian

Goodbye Yellow Brick VAR

Oh we’ve finally found where our future lies, beyond the yellow brick VAR ...
Read More
I Am Not Reading Your Security Policy

I Am Not Reading Your Security Policy

Wondering why people will not read your security policies? Maybe because they are unreadable. Its time to modernize the information security ...
Read More
The Gilfoyle Problem

The Gilfoyle Problem

We are going on a Vision Quest to explore our Gilfoyle Problem in IT and cybersecurity ...
Read More
PCI DSS 3.2 Multi-Factor Authentication Clash

PCI DSS 3.2 Multi-Factor Authentication Clash

Multi-factor authentication (MFA) is a tried and true technology that rarely incites debate. How then did MFA became a hotly debated ...
Read More

Slash your costs with Anitian

Gartner Hype Cycle - Anitian

FedRAMP guide