Revolutionizing Authentication Security: Introducing MachineTruth AuthAssessor

Tweet   In today’s rapidly evolving digital landscape, the security of authentication systems has never been more critical. As enterprises continue to expand their digital footprint, the complexity of managing and securing authentication across various platforms, protocols, and vendors has … Continue reading

Improving Enterprise Security Posture with MachineTruth: Global Configuration Assessment

Tweet   In today’s complex IT environments, ensuring proper and consistent device and application configurations across an entire enterprise is a major challenge. Misconfigurations and unpatched vulnerabilities open the door to cyberattacks and data breaches. Organizations need an efficient way … Continue reading

MachineTruth Global Configuration Assessments Video

Tweet Here is a new video about the MachineTruth™ Global Configuration Assessment offering.  Check it out for more information about using our proprietary analytics, machine learning, and best practices engine to improve your security posture holistically, no matter the size … Continue reading

Interview on MachineTruth Global Configuration Assessments

Tweet Recently, Brent Huston, our CEO and Security Evangelist, was interviewed about MachineTruth™ Global Configuration Assessments and the platform in general. Here is part of that interview: Q1: Could you explain what MachineTruth Global Configuration Assessments are and their importance … Continue reading

ISO/IEC 27001 Firewall Review Compliance With MachineTruth

Tweet Enhancing Information Security with MachineTruth™ Global Configuration Assessment In the landscape of information security, ISO/IEC 27001 compliance is a cornerstone for safeguarding an organization’s digital assets. A critical aspect of adhering to these standards is the meticulous review of … Continue reading

Meeting PCI-DSS 1.1.7 with MachineTruth Global Configuration Assessments

Tweet Explanation of PCI-DSS requirement 1.1.7 The process for reviewing firewall, router, and network device configurations and rule sets every six months involves several steps to ensure compliance with PCI DSS Requirement 1.1.7 and maintain network security controls and router … Continue reading

Network Segmentation with MachineTruth

Tweet About MachineTruthTM We’ve just released a white paper on the topic of leveraging MachineTruth™, our proprietary network and device analytics platform, to segment or separate network environments. Why Network Segmentation? The paper covers the reasons to consider network segmentation, … Continue reading

Segmenting With MSI MachineTruth

Tweet Many organizations struggle to implement network segmentation and secure network enclaves for servers, industrial controls, SCADA or regulated data. MicroSolved, Inc. (“MSI”) has been helping clients solve information security challenges for nearly twenty-five years on a global scale. In … Continue reading

MachineTruth As a Validation of Segmentation/Enclaving

Tweet If you haven’t heard about our MachineTruth™ offering yet, check it out here. It is a fantastic way for organizations to perform offline asset discovery, network mapping and architecture reviews. We also are using it heavily in our work … Continue reading

Securing Patient Data: The Essential Role of Firewall and Router Reviews in HIPAA Compliance

Tweet Firewall and router configuration reviews are pivotal in maintaining HIPAA compliance, safeguarding sensitive healthcare information from unauthorized access and potential cyber threats. Regular assessments of network infrastructure help organizations identify vulnerabilities, ensuring the confidentiality, integrity, and availability of patient … Continue reading