Cyber Security
Insights
Keeping Up = Being Left Behind: SolarWinds Debacle Demands Proactive Risk-Based Security
Business leaders need to view cybersecurity with a proactive risk-based approach and stop viewing the strength of their cybersecurity on what standards and compliances they’ve gained via a check-box approach. And the latest case study of ignoring that approach...
CMMC Frequently Asked Questions from DoD Contractors
The Cybersecurity Maturity Model Certification (CMMC) is a framework being rolled out by the Department of Defense (DoD) in an effort to combat cyber attacks and breaches. Here, we answer common questions about it. The Who, What, and Why of CMMC Compliance 1. Who does...
Defense Contractors Are Looking for the Wrong Traits in Their CISO
Threats to today’s defense industrial base (DIB) organizations exist in the digital landscape. That’s why a CISO is one of the most critical hires a defense contractor can make. While DFARS requirements and CMMC compliance are huge topics of conversation,...
Answer these 3 Questions to Adopt a Risk-Based Cybersecurity Framework
Successful cybersecurity initiatives need to be launched by a business leadership team that's clearly framed risk for the rest of the organization. That said, many executives defer this responsibility to the CISO or IT personnel because they think this group is most...
Cybersecurity Tips: Securing Financial Information In the Holiday Season
The holiday season is on the horizon making it an exciting, yet stressful season for some. The official start of the holiday shopping season is on the day after Thanksgiving, Black Friday, where people go out to the mall to find the best deals on gifts to give to...
CMMC is Good, But May Not Be Enough
In the defense industrial base (DIB), organizations must adhere to DFARS compliance, which will soon include CMMC compliance requirements. For example, NIST 800-171 3.2.2 states that organizations “include training procedures for employees to understand their role and...
Get in touch!