SecureStrux Provides ACAS Training and Support for the United States Space Force

Posted on:

SecureStrux is excited to announce we have begun a short-term arrangement with the U.S. Space Force to provide training and support for their Assured Compliance Assessment Solution (ACAS)[...]

Read More

What Are Tenable and Assured Compliance Assessment Solution (ACAS)?

Posted on:

Organizations working with the DoD are probably familiar, in part, with the compliance demands for vulnerability scanning and risk assessment. The increasing sophistication of cyberattacks has led[...]

Read More

SecureStrux Provides Auditing Support With the PowerStrux Standalone Auditor

Posted on:

SecureStrux is excited to announce we have been awarded a contract with NSWC Dahlgren Division, part of Naval Sea Systems Command (NAVSEA). NAVSEA will be deploying an enhanced version of our [...]

Read More

SecureStrux is a C3PAO Candidate

Posted on:

SecureStrux is proud to announce that it has received candidacy as a Certified Third-Party Assessor Organization (C3PAO) under Cybersecurity Maturity Model Certification (CMMC) requirements, with[...]

Read More

Ransomware Deterrence in 2021

Posted on:

The news of the Colonial Pipeline hack has raised general awareness of how vulnerable some of our key infrastructures are against modern cyberattacks. Deterrence against ransomware isn’t a pipe[...]

Read More

What is CMMC Access Control and How Does IAM Help You Stay Compliant?

Posted on:

User access is one of the most basic, and yet most necessary, security controls available. With the complex ways in which we combine on-prem and cloud services for customers, it’s obvious how[...]

Read More

The Impact of President Biden's Executive Order on Cybersecurity Readiness

Posted on:

On May 12, 2021, President Joe Biden signed Executive Order 14028, entitled “Improving the Nation’s Cybersecurity”. This EO, released in the wake of the Colonial Pipeline hack, is intended to[...]

Read More

Managed Service Providers vs. Managed Security Services Providers

Posted on:

What is the Difference Between a Managed Service Provider (MSP) and a Managed Security Services Provider (MSSP)?  

More commercial businesses and government agencies are turning to third-party[...]

Read More

RMF Continuous Monitoring (When You’re Out of Bandwidth)

Posted on:

In This Article

  • Capability and budgets are not able to increase at the same rate as the complexity of the Risk Management Framework (RMF) and Continuous Monitoring.
  • In 2019, Defense[...]

Read More

NIST SP 800-172: Enhanced Guidelines & Standards for CMMC

Posted on:

In this Article

  • NIST Special Publication 800-172 (formerly known as 171B) “Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations: Enhanced Security Requirements[...]

Read More

Page 1 of 11 1 2 3 4 5 ... 11 » Last