CMMC Assessment Process (Draft) is Published

Posted on:

 

 

 

 

CMMC Assessment Process (Draft) is Published

Read More

Critical Infrastructure Series: Part III Operational Technology

Posted on:

 

Critical Infrastructure Series: Part III

Operational Technology Cybersecurity

In Part I of the Critical Infrastructure Series, we covered the importance of protecting the nation’s critical[...]

Read More

Corporate Account Takeover Attacks and Prevention

Posted on:

Justin Sylvester Shares Knowledge With SPECOPS on Corporate Account Takeover Attacks and Prevention

Identity theft comes in many forms, one being corporate account takeover. Corporate account[...]

Read More

Emergency Directive Issued for Select VMWare Products

Posted on:

On May 18, 2022, the Cybersecurity and Infrastructure Security Agency (CISA) issued

 Emergency Directive (ED) (22-03) for select VMware products.

The directive confirmed active exploitation of the[...]

Read More

Critical Infrastructure Series: Part II

Posted on:

Critical Infrastructure Series: Part II

Making Sense of the Operational Technology Alphabet Soup

In Part I of the Critical Infrastructure Series, we covered the importance of protecting the nation’s[...]

Read More

CMMC 2.0

Posted on:

CMMC 2.0: You Cannot Afford to Wait – Here’s Why!

Read More

Critical Infrastructure Series: Part I

Posted on:

What is so Critical about Critical Infrastructure?

Over the next several weeks we will be diving deeper and talking more extensively about the importance of protecting the nation’s critical[...]

Read More

Welcoming Sage Perkins-Hurd to SecureStrux

Posted on:
 

SecureStrux is excited to announce that Sage Perkins-Hurd has joined the SecureStrux Team to fill the role of Technical Recruiter, where she will lead recruiting for all internal company roles[...]

Read More

Meet Tony Buenger

Posted on:
                         
We’d like to introduce Tony Buenger, who is the Director of Governance, Risk, and Compliance at SecureStrux, LCC, where he leads and steers the strategic direction of[...]

Read More

CMMC and HIPAA: What is the Connection?

Posted on:
                           

Consider this scenario; you are a Chief Information Security Officer (CISO) for a major university hospital system, with over 10 years of experience working with[...]

Read More

Page 2 of 14 « First « 1 2 3 4 5 ... 14 » Last