Similar Posts
Managing Insider Threat
Cyber insider threat is a significant issue. It comes in multiple flavors – accidental and malicious and can be caused by IT or by general users. While relatively rare compared to ransomware, it is more common than you might think. Learn about the problem here. Audio Video
The Other Half of CMMC Rule Published-Title 48
This is the piece that we have been waiting for and it is both short and covers a lot of details. The Title 48 part of CMMC contains the contracting mechanics and it is what you need to understand if you expect to be awarded a contract. If you have questions and you likely will,…
Security News Update for January 26, 2025
This week’s news includes:
Dark Patterns and the Law
Dark patterns are techniques that web site operators, typically, use to make it more difficult to choose one option than another. For example, try to close your Amazon account or your Facebook account. It used to be that you had to call Amazon and they would try and talk you out of it. Now you…
What is Required for CMMC Level 1 Compliance?
Over the last couple of years we have talked a lot about what is required for CMMC Level 2 certification, but a lot more companies will need to be CMMC Level 1 certified. What is required for this?
Security News Update for February 9, 2025
This week’s news includes: