In Defense of the POAM
Cadre Blog
by Eric Cataline, CISSP | CGRC
1M ago
Life Cycle Case for Tracking an Information System   What is a POAM and how is it useful? The Plan of Action and Milestones with Dates of Completion is a formal to-do list. The POAM (sometimes POA&M) is a key document and function that facilitates the management of an Information System[i] (IS or System) throughout its Life Cycle. The National Institute of Standards and Technology (NIST) defines the POAM as “a document that identifies tasks needing to be accomplished. It details resources required to accomplish the elements of the plan, any milestones in meeting the tasks, and schedu ..read more
Visit website
How to Block Attacks 'Before' the Inbox
Cadre Blog
by Cadre
5M ago
On Wednesday, October 23, 2024, we hosted a webinar with Check Point Software to discuss how organizations can block attacks before they hit the inbox. Based on Cloudflare's 2023 Phishing Threats Report, a staggering 90% of successful cyberattacks start with email phishing.  ..read more
Visit website
Email Compromise Remains Top Threat Incident Type for the Third Quarter in a Row
Cadre Blog
by Cadre
7M ago
New analysis of Q2 threats shows a consistent pattern of behavior on the part of threat actors and threat groups, providing organizations with a clear path to protect themselves ..read more
Visit website
The Evolution and Future of Ransomware
Cadre Blog
by Cadre
9M ago
Previously posted on KnowBe4.com by Javvad Malik The history of ransomware spans over 30 years. The first specimen, known as the AIDS Trojan, was delivered via physical media using the postal system, and, upon its discovery, was quickly remediated by the security industry. More recent examples have proven comparatively more devastating, most notably the Colonial Pipeline incident, which caused fuel shortages and widespread disruption to much of the US East Coast ..read more
Visit website
Cadre Now Available on AWS Marketplace
Cadre Blog
by Cadre
10M ago
We are thrilled to announce that Cadre Information Security is now on the AWS Marketplace. Today, through the partnership, customers can purchase a variety of assessments, training courses, and cybersecurity consulting services where they are already comfortable procuring software and services ..read more
Visit website
Rising Threats: 2024 Cybersecurity Trends Impacting Higher Education
Cadre Blog
by Cadre
1y ago
Nearly two-thirds of campus leaders ranked data security as one of their top concerns. This comes as institutions find themselves at the forefront of an escalating battle against a myriad of cyber threats. From virtual classes to research stored in the cloud, education has become more digital, multiplying the attack surface ..read more
Visit website
March Events: CPX, happy hour, golf, and more!
Cadre Blog
by Cadre
1y ago
The team here at Cadre is excited for another year filled with fun and educational events. Check out some of what we have planned below. We hope to see you when we’re in your neck of the woods ..read more
Visit website
Should You Consolidate Security to Protect Your Hybrid Workforce?
Cadre Blog
by Cadre
1y ago
In today's fast-changing world of hybrid networks and workforces, companies are at a pivotal moment for their security strategies. Everyone is exploring some form of cybersecurity transformation as legacy models show their age in the face of new threats and modern operations ..read more
Visit website
Cybersecurity Awareness Q&A
Cadre Blog
by Cadre
1y ago
To celebrate Cybersecurity Awareness Month this year, Laurie Mason interviewed Tim O'Connor, CISO & Manager of Knowledge Services at Cadre, for some of his best advice for staying safe online ..read more
Visit website
The Evolving Role of Generative AI as a Cybersecurity Force Multiplier
Cadre Blog
by Cadre
1y ago
Nine months ago, the conversations about generative AI were limited. Now, it’s all everyone wants to talk about. AI is among the most disruptive technologies of our time – offering unmatched speed and efficiency. And because of this, its use is a double-edged sword. Adversaries are increasingly employing AI-based, automated tools to create and launch attacks. At the same time, cybersecurity vendors are considering and building AI competencies into their products as the market demands it.   The demand for generative AI-based cybersecurity platforms and solutions is predicted toreach a&nbs ..read more
Visit website

Follow Cadre Blog on FeedSpot

Continue with Google
Continue with Apple
OR