Stars-image

Blog

Welcome to Silent Sector's blog, news, and resource area.

Haidon Storro

Haidon Storro
Cybersecurity Research & Content Manager, Silent Sector -- Haidon Storro is a Cyber Security Analyst for CVS Health. She has her BS in IT Cyber Security as well as security certifications like CompTIA Security+ and ISC2. While Haidon is newer to the security community, she has dedicated herself to learning as much as she can through internships, online courses, and conventions like DefCon. In her free time, she enjoys reading about new advancements in technology, going to security meetups and participating in cyber defense competitions. One of Haidon’s goals is to make the connected world safer by bridging the human aspect with technology.

Recent Posts

0 Comments

Understanding Identity and Access Management Risk Assessments – And Why You Need One!

The safety of your company’s data and systems is crucial. Managing access to key digital assets plays a vital role in how well you can keep your organization’s digital ecosystem safe. This brings us to the importance of identity and access management risk assessment as it’s key in protecting a company from unauthorized access and cyber threats.

Read More
0 Comments

Master Threat Management: 7 Key Tips for a Robust Security Incident Response Playbook

No matter how robust a company’s security program is, it can never guarantee total protection against cyber threats. As such, a detailed incident response plan that allows you to quickly and effectively respond to security incidents is essential. However, If you don’t know how to create an incident response playbook to defend against harmful cyber incidents, we can help.

Read More
0 Comments

What is an IT Security Risk Assessment (And 6 Benefits That You Need to Know!)

A thorough knowledge of the risks a company faces is essential to operating a company in the 21st century. With digital technology powering more and more business operations, risks go far beyond the physical realm and into the digital. Understanding potential cyber risks, and what an IT security risk assessment is, can be invaluable to promoting a company’s potential success.

Read More
0 Comments

What is an IAM Framework and Why Every Company Should Care

Digital tools are now core foundations of most company’s corporate infrastructure. However, these critical solutions are also a source of risk that can significantly harm your business if not managed properly. Safeguarding against such risks requires knowing what an IAM framework is and how it impacts your company's overall security posture. 

Read More
0 Comments

Navigate HIPAA Compliance With These Quick Assessment Checklists

All businesses that deal with Protected Health Information (PHI) are required to adhere to HIPAA rules and regulations. Those that don’t, and are found to be in violation of its standards, can face hefty fines, reputation damage, and even legal action. Our HIPAA compliance checklist will help you avoid such consequences and become fully HIPAA compliant.

Read More
0 Comments

What is CISO as a Service and Why Do Businesses Use Them?

Securing your business’s online presence is not an easy task. It’s complex, resource-heavy that many businesses don’t quite know how to approach or manage effectively. There’s a lot of misinformation out there; it’s tricky for executives to know what security direction to go in without an internal Chief Information Security Officer (CISO) or a CISO as a Service provider.

Read More
0 Comments

CMMC 2.0 - What Changed?

The Cybersecurity Maturity Model Certification (CMMC) is a third-party assessment program created by the DoD to gauge the maturity of an organization's cybersecurity practices and verify the protection of Federal Contract Information (FCI) as well as Controlled Unclassified Information (CUI). When CMMC 1.0 was released in 2017, there were concerns amongst government contractors as it was incredibly pricey for small organizations, contained vague language of CMMC assessment process, and did not include a lot of overlap in cybersecurity requirements to other federal requirements or commonly accepted standards.

Read More
0 Comments

Cybersecurity for Education SaaS - EdTech

Educational Technology or “EdTech” is a discipline of Technology focused solely on the development of Software as a Service (SaaS) to improve student learning. Despite EdTech sounding field-specific, its impact is far-reaching as education or even the lack of it touches everyone’s life. This blog will dissect how cybersecurity intersects with EdTech.

Read More
0 Comments

SAAS Security Issues

The use cases for Software as a Service (SaaS) are undeniably vast and advantageous. However, the nature of subscribing to a cloud service leaves a ton of ambiguity as to who is responsible for its security… The vendor or the customer? This article will present a 10,000-foot view of SaaS and the unintentional risks that surface when organizations bring in cloud services like SaaS. 

Read More
0 Comments

5 Key Traits to Look for In a Virtual CISO

For some time now, organizations around the globe have been met with looming cybersecurity threats, increased pressure from stakeholders, and catastrophic internal IT Security fatigue. As a result, one of the most in-demand leadership positions is the Chief Information Security Officer. Just like numerous other “as a service” platforms, the rise of “CISO as a Service” or Virtual CISO (vCISO) has also become a major game-changer for emerging and medium-sized businesses, allowing them to gain the same cybersecurity direction as a large enterprise, but at a fraction of the cost.

Read More