Brian Petzold

2 min read

Control Assessments Vs. Risk Assessments

When we first start working with new institutions, it is not unusual for us to see them struggling because they have focused their efforts on remediating controls that were found to be missing during a control assessment (NIST, CAT, ACET, RSAT,...

Read More

2 min read

Is Ransomware Dying?

In December 2023 the US Justice Department announced that they had disrupted operations of ALPHV/Blackcat, a ransomware group that was responsible...

Read More

2 min read

Consent Orders Put Focus on Third-Party Risk Management

There have been multiple consent orders issued recently which have made it clear that regulators are starting to enforce new third-party risk...

Read More

3 min read

Best Practices to Ace Your Penetration Test

Every institution should have an internal penetration test performed annually. The goal of the penetration test is for the tester to try to gain...

Read More

2 min read

What is a Good Password Length?

We are often asked what length passwords should be. The answer that we give in general is that we would like user passwords to be at least 14...

Read More

1 min read

Is Your M365 Conditional Access Unconditional?

As attackers are finding new ways to get around multifactor authentication in Microsoft 365, conditional access is becoming more important....

Read More

2 min read

Reviewing the New Interagency Third-Party Risk Management Guidance

On June 6th, the Federal Reserve, FDIC, and OCC released new interagency guidance on third-party risk management. The new guidance, based on existing...

Read More

2 min read

Blocking Outbound Communications

All organizations have (or should have) a firewall that blocks unexpected communications from the Internet to internal network hosts. But what about...

Read More