Zero Trust Security – Behind the Buzz

These days, everyone is talking about Zero Trust Security. A simple Google search will return pages of ads from vendors pushing their Zero Trust product, with promises of instant and foolproof security.  Some vendors even claim to include fairy dust and magic rainbows. While their claims may be somewhat accurate (fairy dust and magic rainbows notwithstanding), one thing that remains unanswered is...

Keep Reading

NIST 800-171 It’s Not Scary, It’s Just Security. Part II – Access Control

NIST 800-171 – Access Control In my last blog post about NIST 800-171, I wrote about how meeting the requirements of 800-171 is more attainable than most would assume. Some of the controls required by 800-171 are security measures already in place courtesy of most modern systems or are already considered best practices within the Information Technology community. For example, anti-virus protect...

Keep Reading

CMMC Update: Version 0.4 Released

What Is CMMC? CMMC stands for Cybersecurity Maturity Model Certification. But first, lets back up a little. Nation-states don’t just attack our military to steal information. Significant losses of intel have come from contractors, and much of it was unclassified data. The Department of Defense (DoD) has responded to this problem with cybersecurity requirements such as DFARS 252-204-7012 a...

Keep Reading

NIST 800-171: It’s Not Scary…It’s Just Security

NIST 800-171 “It’s not scary, it’s just security,” may seem like the understatement of the year. But really, security doesn’t have to be scary. Yes, there are over 100 controls, and yes, they can appear overwhelming. But compliance with NIST 800-171 is attainable. Over the next several weeks I will be writing a mini-series on NIST 800-171 and will take the tech talk out of the complianc...

Keep Reading
Call Us: (571) 384-7950