Exploring ISO 27001 Audits: Types, Importance, and Execution Tactics
These audits not only confirm adherence to the ISO/IEC 27001 standard but also assess the effectiveness of an organization's Information Security Management System (ISMS)...
Navigating ISO 27001 Controls: An In-Depth Overview
ISO 27001 controls are measures, policies, processes, and procedures that organizations must adopt to meet the security requirements set forth in the ISO 27001 standard...
ISO 27001 Compliance Checklist: Simplified Implementation Guide
ISO 27001 offers organizations a systematic and holistic approach to safeguarding their critical data, whether it's confidential customer information, financial records, or intellectual property...
An In-Depth Overview of NIST CSF Categories
This guide offers a comprehensive exploration of CSF categories, shedding light on their functions and providing a roadmap for your initial steps in their utilization...
NIST CSF vs. NIST 800-53: A Comparative Analysis
Both NIST Cybersecurity Framework (NIST CSF) and NIST Special Publication 800-53 (NIST 800-53) serve the common goal of enhancing cybersecurity, however, they differ significantly in their approach and applicability...
What is NIST CSF? A Comprehensive Guide to the NIST Cybersecurity Framework
The NIST Cybersecurity Framework was established in response to the growing need for a unified and robust cybersecurity approach in an age marked by relentless cyber threats...
NIST SP 800-53 Compliance Checklist: Ensuring Data Security and Regulatory Adherence
Whether you represent a government agency, operate as a government contractor, or simply lead an organization looking to enhance its security protocols, this comprehensive guide is designed to assist you...
Exploring the 20 NIST SP 800-53 Control Families
NIST SP 800-53 consists of 20 different control families, each focusing on specific aspects of cybersecurity. These families encompass a wide range of topics...
What is NIST SP 800-53?: Understanding the Standard and Tips for Compliance
NIST 800-53 has a rich history dating back to its inception as a response to the escalating technological capabilities of national adversaries. Over the years, it has evolved to encompass a comprehensive set...
CIS vs. NIST: A Comprehensive Comparison
Before we dissect the particulars of CIS, NIST, and their comparisons, it's crucial to comprehend the overarching role of cybersecurity frameworks...
What is CIS Compliance and What Role Do CIS Benchmarks Play?
CIS compliance means adhering to the cybersecurity standards and guidelines set forth by this reputable institution...
What Are CIS Critical Security Controls? A Comprehensive Guide to the 18 Controls
At their core, the CIS Controls serve as actionable recommendations that organizations can leverage to identify, anticipate, and respond to digital threats effectively...
Demystifying General IT Controls (GITC) and IT General Controls (ITGC) Audits
The primary objective of GITC and ITGC audits is to ensure that an organization's IT control environment is robust, compliant, and capable of mitigating cybersecurity risks...
Exploring the Controls Within General IT Controls (GITC) and IT General Controls (ITGC)
Within the expansive landscape of GITC and ITGC controls, various critical areas stand out, each contributing to the comprehensive cybersecurity fabric...
Understanding General IT Controls (GITC) and IT General Controls (ITGC)
ITGC and GITC ensures that data remains accurate, that systems are accessible only to authorized personnel, and that the risk of security breaches is minimized...
Bridging the InfoSec Gap: What If Self-Service could be Full-Service?
Multiple factors go into the self-service or full-service decision and it’s no different when we apply those models to the technologies we use to manage Information Security...
Tangled Webs of Deception: Scary Cybersecurity Scenarios and the Dark Art of Social Engineering
In today's interconnected world, cyber threats have become increasingly sophisticated, and attackers are often exploiting the weakest link in the security chain: human error...
Tentacle 10: The Human Element of Cyber Attacks and Steps For Prevention
When it comes to Cybersecurity and cyber attacks, ‘human error’ is consistently identified as a major contributing factor...
Who’s With Me? An Invitation To Do More - Together
Two years ago, if someone would have asked me about the “security posture” of my workplace, they probably would have gotten a blank stare or I may have asked them to repeat the question...
Embracing Integrations: Pivoting Development Strategies for Long-Term Success
When you break down all the ideas and suggestions that come your way, you will recognize some significant downsides in attempting to be everything to everyone. Overall diminished quality, tool fatigue, and inefficiencies in your approach to growing your product, to name a few...
Tentacle 10: Common Types of Cyber Attacks and Steps for Prevention
In this list, we’ve researched and aggregated some of the most common types of cyber attacks to explore their characteristics and steps to prevention...
Leveraging Large Language Models for Smarter Cybersecurity
Deep learning neural networks (or more specifically “transformer models”), like the one powering our import tool at Tentacle, are able to not only begin to build a graph of words like the above example, they are also able to understand how those words might change...
The 5 Unanimous Needs InfoSec Professionals Are Hoping Technology Will Solve
I’ve been laser-focused on the information security space now for the last three years since launching Tentacle, though ideated on the Tentacle concept for many years prior while buried deep in security questionnaires...
Don’t Let Those (IT) Resolutions Slip Just Yet: How Tentacle Helps Tackle InfoSec Priorities in 2023
For any IT leader using CIO.com’s resolution list as a guide, I’ve provided specific ways, when it comes to information security, that Tentacle will help achieve your (IT) resolution list for 2023...
Altruism in Information Security, Part 3: Effort (and Sacrifice) in Execution
I could not wrap up this blog series without at least taking some time to acknowledge and speak to the amount of effort that is truly required to pull off a proper information security program...
Altruism in Information Security, Part 2: Identifying Hurdles Along the Path
In Part 1 of “Altruism in Information Security” I shared my thoughts on how I find the concept of altruism to be woven into the fabric of the ideal Information Security program...
Altruism in Information Security? (Part 1 of 3)
Altruism and Information Security; two terms not commonly used together - the first term not often used to describe the foundational philosophy of the latter...
Information Security Management and the Connectivity Gap: Solving for the Missing Links in Enterprise Information Security
Let’s start with the basics: a foundational definition of Information Security management is the process of developing, maintaining, and continuously improving processes...
Let The Framework Be Your Guide: Tips for Identifying the Right Security Framework
The idea of formalized Information Security leveraging a security framework isn’t new. As study after study is released detailing the continuous increase of cyber security threats faced by all organizations...
Improve Your Security Posture With Centralized Management
Security posture is a measure of your organization’s overall security effectiveness. The term can be a little confusing, because it doesn’t just refer to how good your company is at...
Milestones Hit & Lessons Learned
The timing of when I started Tentacle, associated with what was really making the headlines in our society, and my previous lessons learned from YourCause, inspired me to launch this business...
Removing the Sales Cycle Bottleneck: How to Win More Deals (FASTER!) With Security Questionnaire Automation
There’s no getting around them - and if I’m honest - even my inner salesperson, driven by the speed of the sale, knows filling out security questionnaires is an essential component...
I'm Looking for the Brave
I jumped headfirst into the Information Security space as a result of being pummeled for years by the gross inefficiencies and...
The parallels between running the Rim-2-Rim-2-Rim (Grand Canyon) and Security Assessments
Since starting Tentacle, I have been standing on my soap box preaching the absurdity of the state of today’s information security market...
Is the InfoSec Risk Assessment Process Genuinely Disingenuous?
Over the years, I have grown increasingly frustrated and disappointed with the approaches taken by the industry...
Performing an Effective IT Risk Assessment
Data breaches, network software exploitation, utility shutdowns: even a cursory glance at headlines today is enough to send a shiver up the most confident executive’s spine...
Good On My Word: Fixing the Broken Information Security Assessment Process 10-years Later
In starting my last business (YourCause), I had assumed that once I was able to build our core product to a certain point...
Equality Learning Group - Reflections on Caste
From January to March, our Equality Learning Group held its first book club and read Caste by Isabelle Wilkerson...
I would never admit sayin' this but...
This blog post is not intended to be my confessional or my therapeutic cleanse for the last 44 years, but rather my attempt to pass along a few lessons...
The Last Administration Might Have Been More Powerful Than We’re Giving It Credit For...
I am not here to endorse or criticize the outgoing administration, nor am I seeking to push my political views onto anybody who might read this. We all...