CMMC

4 Reasons Cybersecurity Attack Surfaces Are Expanding

The COVID-19 pandemic impacted individuals and businesses all over the world in one way or another. Almost overnight, it disrupted the way people went about their daily routines and how companies operated. Amidst all the chaos, changes to the cyber landscape increased at an unprecedented pace. Some of the trends that powered these changes and …

4 Reasons Cybersecurity Attack Surfaces Are Expanding Read More »

Why Attacks on Critical Infrastructure Are Dangerous

Critical Infrastructure (CI) comprises physical and cyber assets vital for the smooth functioning of societies and nations across the globe. The sectors that make up critical infrastructure differ from one country to another. For example, the USA considers 16 sectors to be vital as opposed to 13 in the UK. The disruption or damage of …

Why Attacks on Critical Infrastructure Are Dangerous Read More »

Achieving CMMC: The Interim DFARS Rule and What It Means for You

The Cybersecurity Maturity Model Certification (CMMC) was formally made part of the Defense Federal Acquisition Regulation Supplement (DFARS) in January 2020. The decision sent over 300,000 members of the defense industrial base (DIB), mostly small and midsize businesses (SMBs), into a state of frenzy. Most found themselves drowning in all the unnecessary noise surrounding CMMC …

Achieving CMMC: The Interim DFARS Rule and What It Means for You Read More »

Lionfish Cyber Security

What is the Cybersecurity Maturity Model Certification (CMMC)?

Author TruMethods Standards Manager, Brian Dappolone If you have not heard of the Cybersecurity Maturity Model Certification (CMMC) yet, it is not the end of the world. The latest certification requirements were finalized by the Department of Defense (DoD) on January 31st and at the moment they are in the process of approving auditors for the …

What is the Cybersecurity Maturity Model Certification (CMMC)? Read More »

Lionfish Cyber Security

Recommended Best Practices for a Secure Supply Chain

Your business’ cybersecurity posture must prioritize detection, evaluation and mitigation of risks posed by your supply chain. It is vital that your security is upgraded on a regular basis to better prepare for any worst-case scenarios. Having said that, it should come as no surprise that a vulnerable third party that your organization deals with …

Recommended Best Practices for a Secure Supply Chain Read More »