Compliance

February 14, 2020
3 Ways to Prepare for CMMC

3 Ways to Prepare for CMMC The Cybersecurity Maturity Model Certification (CMMC) is a recent mandate from the Department of Defense (DoD) for all vendors to...

Read More
January 27, 2020
Top 4 reasons why you need FedRAMP Certification

What is FedRAMP, and why is it important for your business The FedRAMP authorization program was created in 2011 to provide a  “standardized approach to security...

Read More
November 21, 2019
Getting started with DFARS and FISMA compliance

There’s an easier way to accelerate compliance If you’re reading this blog, you’re probably already aware of how difficult it...

Read More
May 15, 2019
Even with automation, security baselines like STIG or CIS remain a challenge to manage. But there is hope.

Ever ask a sysadmin what they find most tedious about their job? If they’re being honest, keeping up with security...

Read More
June 10, 2018
Inherent Risk Tiering for Third-Party Vendor Assessments

It can be a challenging and overwhelming task to adequately manage the risk associated with outsourcing technology or business processes,...

Read More
December 15, 2016
A+: AMI’s, Automation & AWS

A few weeks ago, I attended AWS re:Invent 2016 with nine of my colleagues. If you have never been, re:Invent is...

Read More
November 24, 2016
Stop By Booth 118 @ AWS re:Invent and Speak to Our Team of Cybersecurity Experts

Read More
November 24, 2016
Stop by Booth 118 @ AWS re:Invent to Learn How We Can Secure Your Cloud

Read More
October 5, 2015
The AWS Shared Responsibility Model: Part 1 – Security in the Cloud

Cloud Service Providers (CSP) offer a range of infrastructure, platforms, and software for customers to consume. Whether you are looking...

Read More
April 7, 2015
FedRAMP Compliance – Is it worth it?

If you are a company with a cloud service, there are likely quite a few questions you are asking yourself...

Read More
March 26, 2015
Secure Configuration Management through Automation

Overview Automation is a beautiful thing. It can reduce the overall workload for performing a task by allowing us to...

Read More
May 25, 2012
Whistleblowers

The other day I read this article over at TaoSecurity which was a follow-up to a post from a couple weeks...

Read More
12