Month: February 2024
In the ever-evolving domain of cybersecurity, the blend of experience and innovation stands paramount. Ernie Espinoza, the seasoned Information Security Systems Manager at GE Aerospace, offers a fascinating narrative that encapsulates over two decades of navigating digital threats across the IT and IA landscapes, including pivotal years with the Department of Defense. His journey from…
Read MorePicture it: You’ve just finished dinner with your family. You’re on the couch in your living room, winding down for the evening, when suddenly your phone goes off. It’s an alert from your security team informing you of a data breach. All of your assets are being held for ransom and you have approximately 48…
Read MoreEffectively managing vulnerabilities is a critical component of cybersecurity. It requires continuous attention and various factors involving risk management, asset inventory, budget, time, environmental complexity and automation. The goal of a vulnerability management program is to identify, classify, remediate and maintain mitigations of all vulnerabilities throughout the environment to proactively defend against threats. Developing and…
Read MoreSafeguarding sensitive information against cyber threats has become a top priority for the Department of Defense (DoD). The defense industry is a prime target for cyberattacks, including espionage, data breaches and sabotage from nation-states and various criminal entities. To tackle this challenge head-on, the DoD introduced a groundbreaking initiative known as the Cybersecurity Maturity Model…
Read More