Similar Posts
Dark Patterns and the Law
Dark patterns are techniques that web site operators, typically, use to make it more difficult to choose one option than another. For example, try to close your Amazon account or your Facebook account. It used to be that you had to call Amazon and they would try and talk you out of it. Now you…
Managing Insider Threat
Cyber insider threat is a significant issue. It comes in multiple flavors – accidental and malicious and can be caused by IT or by general users. While relatively rare compared to ransomware, it is more common than you might think. Learn about the problem here. Audio Video
What is the Shared Responsibility Model and How Does it Affect Me?
The shared responsibility model is the way that cloud service providers reduce their risk if something bad happens. For the most part, unless you have an unusual contract with your cloud service provider, if something bad happens, it is your problem. If you have not planned for this, you could be in deep yogurt. Learn…
Creating a PIEE/SPRS Account and Entering Your Score
Here are two videos; the first one shows you how to create an SPRS account; the second shows how to enter a new score. NOTE: You will see that I got an error on the PIEE administrator role in the first setup. That may be due to the fact that I already have an account…
March 2023 Update for CMMC
CMMC is an ever changing target. Here is the newest information on it that we have.
DoD Issues “Class Deviation” for NIST SP 800-171 Rev 3
We knew that DoD had to resolve the conflict between the current 7012 DFARS and the CMMC Part 32 rule that was released in December, but we did not know HOW they were going to resolve it. For defense contractors who are wrestling with getting ready for CMMC, their temporary workaround is the best we…