USACE UROC Awards SecureStrux Contract for CCRI After-Action Support.

Posted on:

SecureStrux has been awarded a contract with the United States Army Corps of Engineers to provide focused Command Cyber Readiness Inspection (CCRI) after action support. Our DoD-qualified team of[...]

Read More

JFHQ-DODIN recently released TASKORD 20-0020.

Posted on:

The TASKORD 20-0020 directive covers the new operational guidance for conducting ACAS (Tenable) vulnerability scans on DoD Information Networks (DODIN). There are several important changes to the way[...]

Read More

4 Steps Your Organization Should Be Taking To Prepare for CMMC 

Posted on:

The DoD officially released version 1.0 of its Cybersecurity Maturity Model Certification (CMMC) approach. Now, DoD contractors are running full steam ahead to try and figure out what the next steps[...]

Read More

What is CMMC?

Posted on:

What is the Cybersecurity Maturity Model Certification (CMMC)?

The Cybersecurity Maturity Model Certification (CMMC) is the Department of Defense's (DoD) newest verification system designed to ensure[...]

Read More

PowerStrux Standalone Auditor User Reference

Posted on:

The PowerStrux Standalone Auditor produces a report containing the following:

  1. User logon and logoff dates and times
  2. Data transfers and print jobs
  3. Failed logon attempts
  4. Account management events
  5. User[...]

Read More

Meet Thad Wellin, Lead Cybersecurity Analyst & CMMC Lead

Posted on:

Thad Wellin, CISSP, SEC+, Certified Expert RMF Professional (CERP)Lead Cybersecurity Analyst in Tampa, FLSpecializing in RMF, CUI (CMMC)

Joined SecureStrux February 2020

If cybersecurity was a[...]

Read More

3 Ways Defense Contractors Can Improve Cybersecurity And Compliance

Posted on:

Key Article Takeaways

  • Cybersecurity compliance is vital to successfully bidding on DoD contracts in 2020.
  • CMMC level compliance must be achieved in order to successfully bid on contracts in 2020.
  • [...]

Read More

How is Cybersecurity Compliance Expertise Measured?

Posted on:

Key Article Takeaways

  • Cybersecurity compliance expertise can be measured using key metrics for implementation, effectiveness, efficiency, and impact best practices. 
  • Results from experts should[...]

Read More

An Interview with Roy 'Mac' Kincaid

Posted on:

 

Roy ‘Mac’ Kincaid is a fan of a good cyber warfare movie, but this seasoned reviewer/auditor, instructor, and administrator didn’t intend to have a long-term career in cybersecurity. Mac admits his[...]

Read More

Cyber as a Service: Introducing Our New Suite of Services

Posted on:

Cybersecurity becomes a rapidly growing concern each day for businesses in every sector, per Information Security Buzz News. Amid increasing regulatory matters and an ever-expanding threat[...]

Read More

Page 6 of 13 « First « 1 ... 4 5 6 7 8 ... 13 » Last