The Charles IT Blog

Get the latest insights, information, and news to help you keep up with all that is happening in the fast-moving world of IT!

Why You Need a NIST Cybersecurity Framework Maturity Assessment

Why You Need a NIST Cybersecurity Framework Maturity Assessment

November, 2021 | Sal Marino

One of the biggest challenges in building a sufficiently robust information security program is that there are so many guidelines and frameworks to choose from. Moreover, every business has a unique [...]

The NIST Framework Tiers Explained

The NIST Framework Tiers Explained

October, 2021 | Foster Charles

The NIST Cybersecurity Framework is a leading global standard in cybersecurity, as well as the basis of many legal regulations and other standards. There are three main elements to the framework – [...]

Mapping NIST CSF Controls: How to Get Started

Mapping NIST CSF Controls: How to Get Started

October, 2021 | Foster Charles

Control mapping is the process of bringing together two or more compliance domains or sets of business requirements to build a strategy that aligns to your unique needs. While the NIST CSF controls [...]

A Guide to NIST CSF Controls

A Guide to NIST CSF Controls

October, 2021 | Foster Charles

The NIST Cybersecurity Framework is a globally recognized set of best security practices and guidelines. Although compliance is voluntary, and the framework provides much flexibility over how [...]

Understanding the Purpose of NIST CSF Controls

Understanding the Purpose of NIST CSF Controls

October, 2021 | Foster Charles

The NIST Cybersecurity Framework was first released in 2014 with the purpose of promoting better risk management and innovation across the critical infrastructure sector in the US. Since then, it has [...]

What are the NIST Framework Core Functions?

What are the NIST Framework Core Functions?

October, 2021 | Foster Charles

The NIST2.0 Cybersecurity Framework seeks to better align business risk management with the rising demands of information security. To that end, it serves as the foundation for any robust [...]

Why Following NIST CSF Requirements is More Important Than Ever

Why Following NIST CSF Requirements is More Important Than Ever

September, 2021 | Sal Marino

Far too many business leaders still consider the needs of information security to be a burden, and a costly and time-consuming one at that. But as the threat landscape continues to evolve alongside [...]

Why is the NIST Cybersecurity Framework Important?

Why is the NIST Cybersecurity Framework Important?

September, 2021 | Foster Charles

Organizations of all types and sizes face unrelenting threats from malicious actors, including organized cybercrime, corporate espionage, and state-sponsored attackers. Every business owes it to [...]

3 Ways Dark Web Monitoring Helps Ensure a Successful CMMC Assessment

3 Ways Dark Web Monitoring Helps Ensure a Successful CMMC Assessment

August, 2021 | Foster Charles

While the cybersecurity maturity model certification (CMMC) framework makes no mention of the dark web, it is essential that security leaders understand the risk it presents.

CMMC Certification: Why Managed Detection and Response is Critical

CMMC Certification: Why Managed Detection and Response is Critical

August, 2021 | Foster Charles

The cybersecurity maturity model certification (CMMC) 2.0 requires a multilayered approach to information security. Of the 171 practices listed in the CMMC 2.0 cybersecurity framework, 11 fall into [...]

Most tech consulting starts with “Press 1”

We just like to start with “Hello.”