News & Guidance

1+

The New York Department of Financial Services (NYDFS) Cybersecurity Regulation 23 NYCRR Part 500 Getting Started Guide

Certifying your entity each year is a complex task and will requires a CISO or vCISO with first hand knowledge of your network and all the IT systems connected to resources within your network.

EntraID Identity Provider (Azure) and Microsoft 365 Onboarding/IDP Solutions

Exploring full-stack management of Microsoft 365 and Entra ID for organizations that require reliable identity control, seamless user lifecycle management, and hardened security operations.

Two Actively‑Exploited Cisco ASA Vulnerabilities and ED 25‑03

Federal agencies (and organizations managing Cisco ASA/FTD firewalls) must inventory, patch, and report under CISA’s ED 25‑03: one vulnerability enables remote code execution; the other enables privilege escalation.

Guidance on Managing Third-Party Service Provider Risks (NYSDFS)

To support this imperative, NYDFS is issuing this guidance to help Covered Entities understand how to systematically assess, contract with, monitor and eventually terminate TPSP relationships in a manner consistent with the Cybersecurity Regulation (23 NYCRR Part 500) and industry best practices.

Major AWS Outage October 20th, 2025

How a disruption in AWS’s US-East region triggered global downtime, and what every business must learn about cloud dependency, resilience and incident response. AWS outages in the US-East-1 region have created widespread disruptions seen on a global scale. More than 1,000 companies worldwide were affected, according to Downdetector. AWS is a platform that acts as a backbone for hosting websites and applications for major companies across the world, and when a significant failure occurred on October 20th, the portion of the internet depending on AWS as its sole provider experienced outages, and several companies experienced wide scale downtime.

System Hardening

Hackers don’t always “break in” more often, they walk through doors that were left unlocked: a forgotten admin account, an unpatched OS, or a default password. System hardening closes those doors. It ensures that even if attackers find their way to your network, they find no easy path forward.

Zero Trust Architecture

With Zero Trust, every user, device, and system must prove its legitimacy every time it requests access to company resources (such as logging into email or cloud accounts). Zero trust architecture forces checks on device health, location, and behavior before granting access to login.

Backup Solutions

Backing up your data isn’t optional, it’s essential. A robust data backup and recovery solution protects your business from ransomware, system failures, and disasters. In this guide, SES explains why backup systems are critical, how they support business continuity and disaster recovery (BC/DR), and what security measures ike AES-256 encryption and multi-factor authentication keep your backups truly safe.

Next Gen Firewalls

Next-Gen Firewall (NGFW) solutions deliver the intelligence, automation, and security depth modern businesses need to defend against evolving cyber threats. A Next-Generation Firewall doesn’t just block ports; it analyzes traffic, detects malicious behavior, and enforces security policies dynamically across hybrid and cloud environments.