How to Quickly Use the AESCSF Assessment Framework

how to quickly use the aescsf assessment framework

What is the AESCSF Framework? In 2017, the Australian government set out an initiative to strengthen the country’s cybersecurity posture and created the AESCSF. The framework went under revision in 2019, and again in 2020. Though no major changes were made in 2020, the revision came as part of Australia’s Cybersecurity Strategy 2020, which has […]

Here’s How to Use the SP 1800-32 Framework

heres-how-to-use-the-sp1800-32-framework

  As online connectivity has become more ubiquitous in far-reaching places, organizations in the critical infrastructure sectors have begun deploying Internet of Things (IoT) and small-scale distributed energy resources (DER) devices to help provide data and information about a number of industrial control systems (ICS).   What is the SP 1800-32 Framework? While these devices […]

Maritime Cybersecurity Risk Assessment Tool

Maritime-cybersecurity-risk-assessment-tool

Battling 21st Century Threats on the High Seas While historically pirates have been considered the primary threat to maritime security, increasingly ships and shipping have become vulnerable to cybersecurity threats. In particular, a number of the systems aboard vessels have been found to lack protection measures to safeguard ships from specific types of cybersecurity attacks. […]

Bill Lawrence: Chief Information Security Officer

Bill Lawrence

Bill Lawrence came to SecurityGate.io to serve as Chief Information Security Officer with an incredible background. In the announcement of Bill joining our team you can read the details including how he flew jets in the U.S. Navy, taught cybersecurity courses at the U.S. Naval Academy, and most recently, was Vice President and Chief Security […]

TSA Critical Pipeline Cybersecurity Assessment Framework

TSA Critical Pipeline Cybersecurity Assessment Framework

TSA’s Critical Pipeline Cybersecurity Assessment Framework Available From SecurityGate.io Platform For Rapid Assessment Completion And Immediate Risk Insight Results FOR IMMEDIATE RELEASE—HOUSTON, TX—JUNE 14, 2021—SecurityGate.io, the #1 risk management SaaS (Software-as-a-Service) platform for industrial cybersecurity, today announced they are making available the cybersecurity assessment framework for critical pipeline owners and operators from the Department of Homeland Security’s […]

Module Builder Enhancements and Features for Consultants

product update blog header

June Product Updates This month’s release includes some exciting new updates to the SecurityGate.io Module Builder, which gives cybersecurity teams the flexibility to create their own custom assessment frameworks. Other features have been included that make it easy for consultants to onboard and manage clients within one secure platform.   SecurityGate.io Custom Module Builder Improvements […]

SOC 2 Assessment Tool

soc 2 assessment tool

If you’re looking for a SOC 2 assessment tool and want to get the most value from your assessment process, make sure to download the white paper at the bottom.   What is SOC 2 The American Institute of Certified Public Accountants (AICPA) produces three reports, known as System and Organization Controls (SOC), during their […]

Two-Factor Authentication

What is Two-Factor Authentication? Two-Factor Authentication (2FA) is a security process in which a user provides two different authentication factors to verify themselves when logging in to a system. Authentication factors could be a knowledge factor (something the user knows, such as a PIN, or secret); a possession factor (ID, token, app); inherence factor (biometrics); […]

Bring Your Own Key Data Encryption

bring your own key data encryption

What is it? Bring Your Own Key (BYOK) is a feature that enables account administrators to protect the data uploaded to the SecurityGate.io platform using their own encryption key. The account as a whole can be protected under a unique key and each assessed entity within the account has the option of being protected under […]

NIST 800-82 Assessment Tool

nist 800-82 assessment tool

Looking for a NIST 800-82 assessment tool to make your cybersecurity assessments easier and faster? Make sure to download the white paper at the bottom to get the most value from your assessment process. What is NIST 800-82? In 2006, the National Institute of Standards and Technology (NIST) released a cybersecurity guide specifically to secure […]

Contact Us