Security, Cost, and Compliance in the Cloud for Medical Nonprofits
Most Nonprofit Organizations (NPOs) are founded to serve or provide assistance to a neglected facet of the community out of goodwill rather than to achieve financial gain.
SANS_M-Wisniewski_Security_Cost_and_Compliance_in_the_Cloud_for_Medical_Nonprofits (PDF, 0.73MB)
5 Dec 2024Related Content
New-to-Cyber Field Manual: How to Break In, Build Skills, and Find Your Path in Cybersecurity
Research PaperNew-to-Cyber Field Manual: How to Break In, Build Skills, and Find Your Path in Cybersecurity
- 11 Nov 2025
- SANS Institute
Securing the Web: Shortening TLS Certificate Lifespans for Enhanced Security
Research PaperGoogle has proposed changing the maximum validity period of TLS certificates from 398 to 90 days....
- 5 Dec 2024
Lack of Intentionality: Honeypots Show Us Wandering Drones
Research PaperMany honeypot studies focus on the trends, sources, and motivations behind recorded attacks. For...
- 9 Oct 2024
Securing the Future: How Memory-Safe Programming Languages Impact Industry Safety
Research PaperThis study aims to empirically evaluate whether programming languages designed with inherent memory...
- 20 Aug 2024
Whacking Moles: Blocklists and Their Role in the Endless Cycle of Malicious Domain Registration
Research PaperFiltering out the evildoers on the Internet is an endless and often unavailing task. With millions...
- 7 Feb 2024
Establishing Confidence in Software Bill of Material (SBOM) Vulnerability Analysis
Research PaperWhen inquiring with IT professionals today, be they system administrators or cybersecurity experts,...
- 8 Dec 2023
Detecting Rogue Ethernet Switches Using Layer 1 Techniques
Research PaperEthernet is a ubiquitous standard for local area networks (LAN) and commonly used in other networks....
- 29 Nov 2023
NTP Over IPv6: A New Look at an Old Protocol
Research PaperThe Network Time Protocol (NTP), described in RFC 5905, is an important and often hidden component...
- 31 Aug 2023
Defeat the Dread of Adopting DMARC: Protect Domains from Unauthorized Email
Research PaperMany large organizations do not implement Domain-based Message Authentication, Reporting, and...
- 11 Nov 2020
Defense in Depth for a Small Office/Home Office
Research PaperMuch attention is given to enterprise security with expensive solutions and teams of both IT and...
- 18 Dec 2019
Security Considerations for Voice over Wi-Fi (VoWiFi) Systems
Research PaperAs the world pivots from Public Switched Telephony Networks (PSTN) to Voice over Internet Protocol...
- 30 Apr 2019
Cyber Threats to the Bioengineering Supply Chain
Research PaperBiotechnology and pharmaceutical companies rely on the sequencing of DNA to conduct research,...
- 12 Feb 2019
Cyber Defense Challenges from the Small and Medium-Sized Business Perspective
Research PaperWith 5.7 million SMBs in the United States, it is essential that the risks involving cybersecurity...
- 17 Nov 2017
Threat Rigidity in Cybersecurity
Research PaperFear Uncertainty and Doubt (FUD) works as an influence strategy by amateur cybersecurity...
- 3 Nov 2017
Botnet Resiliency via Private Blockchains
Research PaperCriminals operating botnets are persistently in an arms race with network security engineers and law...
- 22 Sep 2017
Hardening BYOD: Implementing Critical Security Control 3 in a Bring Your Own Device (BYOD) Architecture
Research PaperThe increasing prevalence of Bring Your Own Device (BYOD) architecture poses many challenges to...
- 22 Sep 2017
ComBAT Phishing with Email Automation
Research PaperAn analysis of organizations' email reporting processes reveals two challenges facing cyber security...
- 15 Sep 2017
Next Generation Endpoint Protection - CIS Control 8, Malware Defense Effectiveness, Performance Metrics and False Positive Rates
Research PaperThe Center for Internet Security (CIS) Critical Security Controls v6.1 is comprised of battle tested...
- 20 Jun 2017
Show Me the Money! From Finding to Fixed to Funded
Research PaperCorporations both large and small, whether public or private, can always benefit from an information...
- 24 Apr 2017
Building and Maintaining a Denial of Service Defense for Businesses
Research PaperDistributed Denial of Service (DDoS) attacks have been around for decades but still cause problems...
- 25 Jan 2017
