Complying with HIPAA regulations is as easy as following four simple steps: Determining whether your organization is considered a covered entity Implementing controls for the prescriptive HIPAA rules Ensuring you…
-
-
To get started on your journey to CMMC 2.0 compliance and DoD contracts, you’ll need: An overview of the sources and context surrounding CMMC 2.0 A snapshot of the relatively…
-
Organizations seeking lucrative DoD contracts need to meet rigorous regulatory guidelines for security. Preparing for a CMMC assessment requires scoping, implementing controls, testing for readiness, securing an assessment partner (if…
-
As one of the leading commercial spyware programs, Pegasus has been used by a host of companies, governments, and other entities to collect sensitive data from individuals’ smartphones. If Pegasus…
-
Military contractors gearing up for CMMC 2.0 compliance may need to work with an official C3PAO to secure certification. C3PAOs play a critical role in the CMMC ecosystem by preparing…
-
In September 2011, The National Institute for Standard and Technology (NIST) created Special Publication (SP) 500-292, “NIST Cloud Computing Reference Architecture,” to establish a baseline cloud computing architecture. NIST SP…
-
Businesses both within and adjacent to healthcare need to comply with the HIPAA data security requirements, which may see changes in 2024. To protect your company from costly fines, you…
-
The PCI 4.0 requirements were made publicly available in March 2022. They cover most of the same ground as prior versions’ requirements, with special attention paid to common areas of…
-
The Defense Federal Acquisition Regulation Supplement (DFARS) governs the acquisition of goods and services for the Department of Defense (DoD). Both officials and contractors must comply with the requirements set…
-
Penetration testing is an advanced cybersecurity method that is especially useful in complex environments, such as those that make heavy use of cloud computing. In these cases, cloud pen testing…