itsecurity

Let’s talk about Scope for a CMMC Assessment

Are you concerned with protecting your organization’s sensitive information and digital assets, but unsure of where to start? As of 2020, the U.S. Department of Defense (DoD) mandates that all defense contractors adhere to their Cybersecurity Maturity Model Certification (CMMC). A CMMC assessment is a specialized cybersecurity evaluation by an approved provider required for entry […]

Cyber Chomps Episode #5 – Albert E. Whale, Maggie Dillon, and Alan Elliott, #Hacked2

Cyber Chomps Episode #5 Albert E. Whale, Maggie Dillon, and Alan Elliott, #Hacked2 Thank you and shout out to Joshua Bruyning for having us on the 5th episode of his podcast Cyber Chomps! Check out the latest from our #Hacked team, including Albert E. Whale, CEH CHS CISA CISSP BSEE CMMC-RP and Alan Elliott! Protecting your Data (both business and personal) […]

Interview with Security Researcher (one of the Co-Authors) #HACKED2

I was honored to be interviewed by the Security Researcher.  He has a definite way with words, and we had a great conversation.  Here’s some extra information from his channel. Security Researcher: I have been working on some things for you. Real things that will help you better protect yourself from modern day cyber threats. […]

Medallion XLN Podcast Ep. 8

Cybersecurity is a field in computer science that is overlooked until it is too late. Albert E. Whale is an expert in the field of Cybersecurity and in Episode 8 of the Medallion XLN podcast we talk about his book #Hacked as well as his crowdfunding effort for ITS-SAFE as well as expert takes on how to […]

Digital Transformation: Cybersecurity, is it an Accelerator or Decelerator

    TiiQu Talk Panel Discussion: Digital Transformation: Cybersecurity, is it an Accelerator or Decelerator Another great Tiiqu Talks session with our CEO Albert Whale, we are discussing Cybersecurity in the Digital Transformation. #cybersecurity #digitaltransformation #hacked #itssafe #visibility

The Cyber Field Podcast

[vc_row][vc_column][vc_column_text] I was honored to be a guest speaker on The Cyber Field podcast with Tom Albert. We discussed the importance of developing a cybersecurity strategy and how to keep your business safe from cyber attacks. I shared my tips for protecting your company’s data, and we also talked about the unseen attacks. It was […]

Quantum Computing, TiiQu Talks Panel Discussion

The Race to adopt is on! The first to the finish line will reap the benefits of enhanced computing power. Krzysztof Kaczmarek – head of product at ORCA and Albert Whale – CEO of IT Security Solutions Discuss the scope for quantum computing to greatly advance the sophistication and potential of our technology. Our speakers […]

SWAT Assessment for Cybersecurity

SWAT Assessment for Cybersecurity by Albert E. Whale, CEH CHS CISA CISSPFounder & CEO Attacks are running full speed ahead Everyday new attacks are reported in organizations of various sizes.  Some of the attacks are recent, most are attacks that occurred months earlier, and are just recently being discovered.  What makes these events so difficult […]

You are not alone!

You are not alone! 99% of all networks have already been breached. by Albert E. Whale, CEH CHS CISA CISSPFounder & CEO A shift in the security paradigm needs to address the Unseen attacks in the environment. Detecting the Unseen activities in the environment explains why there are so many attacks being reported on a […]

5 Reasons that your Business is at Serious Risk

What you may have inside your Businesses Here are just a few of the situations IT Security Solutions has encountered when performing an assessment. All of the comments are focused on organizations with more than 2 computers in their network, a Firewall and Virus protection on each computer.  If this describes your organization, then your […]