• Training
    • Overview
    • Schedule
    • Catalog
    • Training Reviews
    • Delivery Options
    • About Our Training
    • Exam Pass Guarantee
    • Student Funding
    • Alpine Security GSA Schedule
    • DoD 8570/8140 Approved Training
  • Services
    • Overview
    • Medical Device Cybersecurity
    • CISO-as-a-Service
    • Penetration Testing
    • DFARS and CMMC Compliance Audit
    • Breach Prevention Audit
    • Cybersecurity Risk Management Program
    • Enterprise Security Audit
    • Alpine Services Reviews
  • Blog
  • News
  • About Us
    • About Us
    • Meet The Team
    • Why Alpine?
  • Contact
CISO Global (formerly Alpine Security)CISO Global (formerly Alpine Security)
CISO Global (formerly Alpine Security)CISO Global (formerly Alpine Security)
  • Training
    • Overview
    • Schedule
    • Catalog
    • Training Reviews
    • Delivery Options
    • About Our Training
    • Exam Pass Guarantee
    • Student Funding
    • Alpine Security GSA Schedule
    • DoD 8570/8140 Approved Training
  • Services
    • Overview
    • Medical Device Cybersecurity
    • CISO-as-a-Service
    • Penetration Testing
    • DFARS and CMMC Compliance Audit
    • Breach Prevention Audit
    • Cybersecurity Risk Management Program
    • Enterprise Security Audit
    • Alpine Services Reviews
  • Blog
  • News
  • About Us
    • About Us
    • Meet The Team
    • Why Alpine?
  • Contact

Posts by Hilary Meyers

About Hilary Meyers

This author hasn't written their bio yet.
Hilary Meyers has contributed 110 entries to our website, so far.

The State of Ransomware 2020

The State of Ransomware 2020

...

National Cybersecurity Awareness Month: 6 Things to Practice During the Month

National Cybersecurity Awareness Month: 6 Things to Practice During the Month

...

Cybersecurity Checklist for Business Closures, Consolidations, and Acquisitions

Cybersecurity Checklist for Business Closures, Consolidations, and Acquisitions

...

What Is DevSecOps?

What Is DevSecOps?

...

Cybersecurity and a Remote Workforce: What Does the Future Look Like?

Cybersecurity and a Remote Workforce: What Does the Future Look Like?

...

6 Penetration Testing Trends to Have on Your Cybersecurity Radar

6 Penetration Testing Trends to Have on Your Cybersecurity Radar

...

Incorporating Privacy and Security by Design into MedTech

Incorporating Privacy and Security by Design into MedTech

...

What is the Difference Between CMMC, DFARS, and NIST 800-171?

What is the Difference Between CMMC, DFARS, and NIST 800-171?

...

At Risk: Medical Device Cybersecurity Vulnerabilities Expose Patients to Life-threatening Consequences

At Risk: Medical Device Cybersecurity Vulnerabilities Expose Patients to Life-threatening Consequences

...

5 Reasons to Hire a Fractional CISO

5 Reasons to Hire a Fractional CISO

...

Why Private Cybersecurity Training Matters for Your Organization

Why Private Cybersecurity Training Matters for Your Organization

...

Is the CEH Certification Right For You?

Is the CEH Certification Right For You?

...

Internal Penetration Test vs Vulnerability Assessment: Which is Right for You?

Internal Penetration Test vs Vulnerability Assessment: Which is Right for You?

...

Best Beginner Cybersecurity Certification to Get

Best Beginner Cybersecurity Certification to Get

...

Penetration Testing for Compliance: The Top 5 Laws and Regulations that Require Testing

Penetration Testing for Compliance: The Top 5 Laws and Regulations that Require Testing

Penetration testing offers two important benefits — security and regulatory compliance. Rising cybercrime, such as the Equifax breach, has affected millions of Americans who now insist on knowing that companies will keep their data secure. And government regulators are happy to help them do it by penalizing companies that do not comply with federal guidelines.

Securing Medical Devices – Is it Possible?

Securing Medical Devices – Is it Possible?

Last month, the FDA issued a warning about software vulnerabilities on multiple medical devices, including infusion pumps, anesthesia machines, and imaging systems. These vulnerabilities allow threat actors to trigger information leaks, gain access to hospital networks and, most worryingly, remotely control the devices themselves. 

The State of Small Business Cybersecurity in 2020

The State of Small Business Cybersecurity in 2020

Historically, small businesses thought about security in terms of physical property. To protect the items inside the store or office, business owners purchased locks, installed alarm systems, and sometimes hired security guards. Today, however, property crimes are continuing their 25-year decline, meaning the chances of a break-in at your business are about half what they were in 1993. Cybercrimes, however, are the new playground for criminals.

Medical Device Security: Patient Safety Takes Precedence Over Privacy

Medical Device Security: Patient Safety Takes Precedence Over Privacy

When people talk about medical device security, the conversation often turns to data security and HIPAA. There’s plenty to be said about protecting patient privacy, but patient safety is a greater concern.

Hidden Costs of the Small Business Data Breach

Hidden Costs of the Small Business Data Breach

More than 65 percent of senior decision-makers at small businesses still believe that they’re unlikely to be targeted by cybercriminals. About 60 percent of those businesses have no defense plan in place and an estimated 14 percent are insufficiently prepared to respond if an attack does occur.

Risk Management Framework (RMF) Overview

Risk Management Framework (RMF) Overview

This blog post is a transcript of Alpine Security’s Risk Management Framework (RMF) Overview video, which covers an overview of RMF, as defined by NIST 800-37r2. Each step in the process is discussed at a high level:

  1. Categorize

  2. Select

  3. Implement

  4. Assess

  5. Authorize

  6. Monitor

  • 1
  • 2
  • …
  • 5
  • 6

BLOG SEARCH:

Connect with Us

Interested in our cybersecurity training or services? Complete the form below and we’ll get back with you right away. We appreciate your interest.


Recent Posts

  • The State of Ransomware 2020
  • National Cybersecurity Awareness Month: 6 Things to Practice During the Month
  • Cybersecurity Checklist for Business Closures, Consolidations, and Acquisitions
  • What Is DevSecOps?
  • Cybersecurity and a Remote Workforce: What Does the Future Look Like?
  • 6 Penetration Testing Trends to Have on Your Cybersecurity Radar
  • Incorporating Privacy and Security by Design into MedTech
  • What is the Difference Between CMMC, DFARS, and NIST 800-171?
  • At Risk: Medical Device Cybersecurity Vulnerabilities Expose Patients to Life-threatening Consequences
  • 5 Reasons to Hire a Fractional CISO
  • Why Private Cybersecurity Training Matters for Your Organization
  • Is the CEH Certification Right For You?
  • Internal Penetration Test vs Vulnerability Assessment: Which is Right for You?
  • Best Beginner Cybersecurity Certification to Get
  • Penetration Testing for Compliance: The Top 5 Laws and Regulations that Require Testing

Alpine Security is a member of the CISO Global family of companies.

Contact Us:

  • CISO Global
  • 6900 E. Camelback Road, Suite 900 Scottsdale, AZ 85251
  • 480-389-3444
  • info@ciso.inc
  • www.ciso.inc

Get Info

About Our Training
About Our Services
Meet the Team
Blog
Terms of Use
Privacy Policy

Join The Community

  • Facebook
  • LinkedIn
  • Twitter
  • YouTube
  • Mail

Proud Partners

© 2021 · Alpine Security, a Cerberus Sentinel Company