Afidence

Threat Watch - What Is the MITRE ATT&CK Framework - Afidence

What Is the MITRE ATT&CK Framework and How Can You D3FEND Your Business Against Threats? 

By Afidence / May 21, 2024 / Comments Off on What Is the MITRE ATT&CK Framework and How Can You D3FEND Your Business Against Threats? 

This past March, Afidence had the honor of presenting on the MITRE ATT&CK and D3FEND Frameworks at the Ohio Information Security Conference (OISC) hosted by Technology First. It was enlightening to be surrounded by other experts in cybersecurity and empower like-minded professionals with the knowledge to map D3FEND countermeasures and apply ATT&CK techniques to help…

Read More

Navigating Leadership and Technology: A Conversation with Don Rosing, IT Executive at Messer Construction

By Afidence / April 30, 2024 / Comments Off on Navigating Leadership and Technology: A Conversation with Don Rosing, IT Executive at Messer Construction

Don Rosing, an IT executive at Messer Construction, brings over a decade of experience to the forefront of tech leadership. His journey from a large family upbringing to a leading figure in the IT sector underscores the importance of hard work, hands-on leadership and continuous learning in today’s technological world. Early Foundations: Where It All…

Read More
Afidence - Cyber Insurance Renewal

6 Strategies for Successful Cyber Insurance Renewal

By Afidence / April 23, 2024 / Comments Off on 6 Strategies for Successful Cyber Insurance Renewal

Cyber insurance is like a safety net for your business in the digital world. It’s there to protect you from the unexpected, whether it’s a data breach, a cyberattack or even a ransomware attack.  Just like you wouldn’t leave your home without locking the doors, cyber insurance ensures that your business is safeguarded against known…

Read More
Hybrid Environment IT Systems

5 Keys to Unlocking Efficiency in Hybrid Environments

By Afidence / April 16, 2024 / Comments Off on 5 Keys to Unlocking Efficiency in Hybrid Environments

Imagine this scenario: Your business is growing rapidly, but your IT infrastructure struggles to keep up with increasing demands. Downtime, security vulnerabilities, and budget constraints are holding you back. Sound familiar? If so, it may be time to unlock the efficiency of your hybrid environments. In this guide, we’ll explore the challenges businesses face without…

Read More
Conducting a Compliance Assessment in IT Security

Conducting a Thorough Compliance Assessment in IT Security

By Afidence / April 3, 2024 / Comments Off on Conducting a Thorough Compliance Assessment in IT Security

Conducting a Thorough Compliance Assessment in IT Security Compliance is important for any organization, big or small. As a business leader, it’s crucial for you to understand that it’s about more than just checking off boxes. Although checklists are involved, it’s also about cultivating an environment that values integrity, accountability and the safety and well-being…

Read More
TJ Norris - IT Trends with IT People Afidence

Concrete Results in IT: How TJ Norris Paves the Way for Growth at Lithko Contracting

By Afidence / March 21, 2024 / Comments Off on Concrete Results in IT: How TJ Norris Paves the Way for Growth at Lithko Contracting

In the world of concrete construction, where every detail matters from the foundation up, the same precision applies to scaling an IT department. At Lithko Contracting, TJ Norris, the Director of Technology Transformation, knows this all too well. With nearly $2 billion in revenue and a lean IT team, the stakes are high. But for…

Read More
Data Encryption

Data Encryption: A Cornerstone of Modern Cybersecurity

By Afidence / March 21, 2024 / Comments Off on Data Encryption: A Cornerstone of Modern Cybersecurity

It’s just another day in the office. You’re at your desk sending emails containing confidential information or sharing sensitive files over what you believe to be a secure internet connection. But unless you have data encryption, all that data is as safe as an unsealed letter, vulnerable to interception and prying eyes. In an age…

Read More
IT Trends With IT People - Ernie Espinoza

IT Trends with IT People: Navigating the Digital Frontier with Ernie Espinoza

By Afidence / February 29, 2024 / Comments Off on IT Trends with IT People: Navigating the Digital Frontier with Ernie Espinoza

In the ever-evolving domain of cybersecurity, the blend of experience and innovation stands paramount. Ernie Espinoza, the seasoned Information Security Systems Manager at GE Aerospace, offers a fascinating narrative that encapsulates over two decades of navigating digital threats across the IT and IA landscapes, including pivotal years with the Department of Defense. His journey from…

Read More
Cyber_Attack_Countermeasures

Anatomy of a Cyber Attack: From ATT&CK Execution to D3FEND Countermeasures

By Afidence / February 15, 2024 / Comments Off on Anatomy of a Cyber Attack: From ATT&CK Execution to D3FEND Countermeasures

Picture it: You’ve just finished dinner with your family. You’re on the couch in your living room, winding down for the evening, when suddenly your phone goes off. It’s an alert from your security team informing you of a data breach. All of your assets are being held for ransom and you have approximately 48…

Read More
Vulnerability Management Cybersecurity Afidence

Effective Vulnerability Management in the Age of Cyber Threats

By Afidence / February 8, 2024 / Comments Off on Effective Vulnerability Management in the Age of Cyber Threats

Effectively managing vulnerabilities is a critical component of cybersecurity. It requires continuous attention and various factors involving risk management, asset inventory, budget, time, environmental complexity and automation. The goal of a vulnerability management program is to identify, classify, remediate and maintain mitigations of all vulnerabilities throughout the environment to proactively defend against threats. Developing and…

Read More