News

A security audit is a thorough check-up of an organization’s security posture to determine whether current security measures work effectively. It looks at everything from the technical ...
Why is NHI Management so Crucial in Modern Security Strategies? Where the utilization of machine identities is becoming increasingly commonplace, it’s essential to ask: How prominent is NHI management ...
In this blog post, I’ll explain why security-first identity is essential to your cybersecurity strategy, and organizations can leverage identity as a key enabler of security in the digital age.
Proton VPN also had its no-logs policy independently audited by Securitum in July 2024. Independent audits of no-logs ...
AI security must evolve from a compliance exercise into a core pillar of enterprise risk management. For CISOs and technology leaders, this means anticipating not just today’s threats but ...
An audit released by the VA Office of Inspector General found that the department “needs to implement improved controls” to address persistent gaps in its information security program.
The state government initiates a cyber security audit across departments to combat rising cyber crimes, ensuring compliance ...
Firewalls are a key part of the overall security posture in higher education, but they’re not a set-it-and-forget-it type of technology. In order to be effective, firewalls must be kept current. For ...
The Communications Security Logistics Activity is the Army's COMSEC Commodity Manager and Subject Matter Expert. They have been supporting HQDA since 1970.
The audit was performed by the department’s inspector general, which obtained cryptographic hashes for 85,944 employee active directory (AD) accounts. Auditors then used a list of more than 1.5 ...