Emphasizing Continuous Compliance Monitoring

Posted on:

The concept of continuous monitoring has always existed. Everything that requires a periodic assessment by default requires continuous monitoring. The concept of continuous monitoring is a proactive[...]

Read More

CMMC Assessment Process (Draft) is Published

Posted on:

 

 

 

 

CMMC Assessment Process (Draft) is Published

Read More

Critical Infrastructure Series: Part III Operational Technology

Posted on:

 

Critical Infrastructure Series: Part III

Operational Technology Cybersecurity

In Part I of the Critical Infrastructure Series, we covered the importance of protecting the nation’s critical[...]

Read More

CMMC 2.0

Posted on:

CMMC 2.0: You Cannot Afford to Wait – Here’s Why!

Read More

CMMC and HIPAA: What is the Connection?

Posted on:
                           

Consider this scenario; you are a Chief Information Security Officer (CISO) for a major university hospital system, with over 10 years of experience working with[...]

Read More

CMMC 2.0 and Defense Cybersecurity Compliance

Posted on:

In early November, the DoD released an announcement for version 2 of the CMMC compliance standard. Developed with feedback from defense agencies and contractors, CMMC 2.0 seeks to streamline the[...]

Read More

The Cybersecurity Maturity Model: A Path to CMMC Certification

Posted on:

Note: This blog post is an adaptation of a presentation given by SecureStrux Governance, Risk and Compliance Practice Lead Tony Buenger at the California Polytechnic Institute on October 20, 2021.

Read More

Preparing for CMMC Certification

Posted on:

Contractors working with the Department of Defense are quickly responding to the Cybersecurity Maturity model Certification (CMMC) roll out. This security framework is a way for the DoD to determine,[...]

Read More

Tony Buenger Speaks on CMMC Certification at Cal Poly

Posted on:

CMMC is a complex topic that's facing security firms and government contractors around the company. While we are well into the implementation and deployment stages of the CMMC framework, many[...]

Read More

What is CMMC Access Control and How Does IAM Help You Stay Compliant?

Posted on:

User access is one of the most basic, and yet most necessary, security controls available. With the complex ways in which we combine on-prem and cloud services for customers, it’s obvious how[...]

Read More

Page 1 of 3 1 2 3 » Last