Natsar Cybersecurity Insights

See all of our blog posts

Discover practical cybersecurity insights and actionable advice on a range of topics including technical skills, business, and leadership, suited to benefit everyone from senior executives to those just starting out.

Latest Blog Posts

See all of our blog posts below. Scroll down to sort blog posts by various categories.

Water and wastewater cybersecurity illustration showing secure infrastructure and data protection in New York.

  • Oct 15, 2025

How Natsar Can Help New York Water Utilities Get Compliant (and Stay Secure)

  • Josh Moulin

Natsar helps New York utilities meet DOH and DEC cybersecurity rules through vCISO, training, risk assessments, and compliance-ready programs.
Water and wastewater cybersecurity illustration showing secure infrastructure and data protection in New York.

  • Oct 15, 2025

Understanding New York’s Proposed Cybersecurity Rules for Water and Wastewater Utilities

  • Josh Moulin

New York is mandating cybersecurity for water and wastewater systems. Learn what’s changing and how Natsar, a trusted NY firm, can help.
Water and wastewater cybersecurity illustration showing secure infrastructure and data protection in New York.

  • Oct 15, 2025

Comparing DOH and DEC Cybersecurity Requirements for New York’s Water Sector

  • Josh Moulin

Learn how New York’s DOH and DEC cybersecurity rules differ — and how Natsar helps water and wastewater utilities meet compliance affordably and on time.
Water and wastewater cybersecurity illustration showing secure infrastructure and data protection in New York.

  • Oct 15, 2025

Getting Ready for New York’s Water Cybersecurity Rules

  • Josh Moulin

Turn New York’s new water cybersecurity rules into an action plan. Natsar helps utilities assess, train, and comply efficiently and affordably.
Digital forensics professional wearing protective gloves examining a hard drive while taking notes on a clipboard, illustrating evidence handling in a lab setting.

  • Sep 22, 2025

How to Start a Digital Forensics Lab the Right Way

  • Josh Moulin

Learn how to start a mission-driven digital forensics lab in the first post of our series based on real-world lab management experience.

  • Apr 22, 2025

Scanning for Configuration Compliance

  • Josh Moulin

Use Free Tools Like CIS-CAT and SCAP to Check Systems Against Security Benchmarks.

  • Apr 15, 2025

Customizing Configuration Benchmarks for Your Organization

  • Josh Moulin

Learn how to adapt CIS Benchmarks and DISA STIGs to fit your business needs without compromising security or compliance.

  • Apr 8, 2025

Secure Configuration Management Beyond Desktops

  • Josh Moulin

Why hardening routers, firewalls, apps, and cloud environments is just as critical as securing workstations
Presentation slide titled Introduction to Configuration Compliance and System Hardening by Josh Moulin, Principal at Natsar, with a background of secure storage boxes

  • Mar 31, 2025

How to Apply Security Benchmarks to Harden Your Systems

  • Josh Moulin

Using industry standards like CIS Benchmarks and DISA STIGs to reduce risk and enforce consistent configuration settings across your environment.
Configuration compliance lifecycle

  • Mar 24, 2025

Getting Started with Configuration Management and System Hardening

  • Josh Moulin

Learn how configuration management and system hardening improve cybersecurity by reducing vulnerabilities and ensuring consistent, secure system setups.
network segmentation diagram

  • Mar 17, 2025

Protect Your Network from Cyberattacks with Segmentation Strategies

  • Josh Moulin

Learn how network segmentation strengthens cybersecurity by preventing lateral movement, protecting assets, and reducing risk in flat network environments.
 Slide titled "Virtual Private Networks (VPN)" explaining VPN basics, with bullet points on secure connections, encryption, and tunneling, alongside a desktop computer showing a VPN connection screen. Natsar logo displayed in the corner.

  • Mar 6, 2025

VPNs and Beyond - How to Protect Remote Access Without Compromising Security

  • Josh Moulin

Understanding the Risks of Remote Access and the Future of Secure Connectivity

Blog Categories

Click on items below to see blog posts in specific categories

Compliance & Legal

Cybersecurity

Digital Forensics

Digital Privacy

Incident Response

Leadership & Strategy

Natsar News

Risk Management

Tools & Resources

Training & Certification

Coming Soon!

Subscribe To Stay Up to Date!

Your information stays with Natsar - we never sell it or share it.

Our Most Popular Products

  • $695

Managing a Digital Forensics Lab | On Demand Course

  • Course
  • 86 Lessons
  • Includes 1 additional product

This comprehensive course is a masterclass for anyone thinking about starting or currently managing a digital forensics lab. Gain knowledge in key standards like ISO 17025, evidence storage, report writing, best practices, lab budgeting, facility design, physical security, and more. The course includes multiple forms, policies, and templates to accelerate your journey.

Includes 1 Additional Product

  • $150 or 2 monthly payments of $75

Career Coaching Consultation (1 Hour)

  • Coaching session

Get expert career guidance tailored to your goals. Whether you’re just starting your job search, transitioning to a new field, or aiming for a promotion, this one-on-one coaching session will help you refine your resume, sharpen your interview skills, and develop a strategy to stand out. No matter where you are in your career, get the insights and tools you need to succeed. Book your 1-hour consultation today.

No-Cost Cybersecurity Offerings

Learn more about Natsar's no-cost continuing education and resources

  • Free

Introduction to Defense in Depth and Secure Network Design

  • Course
  • 7 Lessons

Earn Continuing Professional Education (CPE) credits at no cost from Natsar. Implementing Defense in Depth and Secure Network Design is essential for protecting against cyber threats. Josh Moulin of Natsar explores key principles and strategies for a layered security approach. Learn about firewalls, IDS/IPS, Zero Trust, DNS security, VPNs, and network segmentation to enhance resilience and minimize attack surfaces.

  • Free

Introduction to Cybersecurity Risk Management: A Practical Primer

  • Course
  • 8 Lessons

Earn Continuing Professional Education (CPE) credits at no cost from Natsar. Managing cybersecurity risks has become essential for protecting sensitive information, ensuring operational continuity, and safeguarding organizational assets. In this video, Josh Moulin, founder of Natsar, delves into the foundational principles and strategies of effective risk management.

  • Free

Introduction to Configuration Management and System Hardening

  • Course
  • 8 Lessons

Earn Continuing Professional Education (CPE) credits at no cost from Natsar. Maintaining configuration compliance and system hardening are critical to a strong cybersecurity posture. Josh Moulin, founder of Natsar, explores key principles and strategies for consistent configurations and reducing vulnerabilities. Learn about CIS Benchmarks, DISA STIGs, and tools like CIS-CAT Lite and DISA SCAP.