An Introduction to CMMC Compliance
by Kyle Daun on September 30, 2021 at 1:00 PM
On January 31st, 2020, the Department of Defense (DoD) announced the release of the Cybersecurity Maturity Model Certification (CMMC), a framework aimed at assessing and enhancing the cybersecurity posture of the Defense Industrial Base (DIB), as it relates to Controlled Unclassified …
Protecting SCADA Systems from Cyber-Attacks
by Felix Alcala on June 24, 2021 at 3:00 PM
Supervisory control and data acquisition (SCADA) is a control system architecture comprising computers, networked data communications and graphical user interfaces (GUI) for high-level process supervisory management, while also comprising other peripheral devices like programmable log …
VA Data Breach Exposes the Personal Info of 46,000 Veterans
by CJ Hurd on September 24, 2020 at 1:00 PM
Being hacked is unfortunately still an all too common occurrence. Even as security measures get stronger, reports of breaches and compromises of individual’s personal information do not seem to be slowing down.
Can the Election Be Hacked?
by Jesse Roberts on August 27, 2020 at 2:15 PM
The presidential election is less than three months away and questions revolving around the overall security of the electoral process should be on everyone’s mind. Let us discuss some areas that may be susceptible to hacking. I will be assigning a threat level based on my own professi …
New York Files First 23 NYCRR 500 Enforcement Action
by Nicholas Foisy on August 20, 2020 at 1:00 PM
On July 21st, 2020, the New York Department of Financial Services (NYDFS) announced that it had filed its first enforcement action under the 23 NYCRR 500 cybersecurity regulation against First American Title Insurance, a large title insurance provider headquartered in Santa Ana, Calif …
CMMC: Moving Away from Self-Assessments
by Nicholas Foisy on July 2, 2020 at 1:00 PM
The Cybersecurity Maturity Model Certification (CMMC) is a certification procedure developed by the Department of Defense (DoD) to certify that contractors working with the DoD have the controls in place to protect sensitive data, also referred to as controlled unclassified informatio …