What cryptos need to know about cybersecurity

What cryptos need to know about cybersecurity.

This article originally appeared on Bitaml.com, and is re-posted here with permission It’s time for every cryptocurrency business, from exchanges to kiosk operators, to take cybersecurity more seriously. The problem? You’re pretty much on your own. We answer some common questions to help your business stay on the bleeding edge of this growing concern. While cryptocurrencies offer users innovative benefits …

cybersecurity review

How to prepare your business for a cybersecurity review.

This article originally appeared on Bitaml.com, and is re-posted here with permission As cybersecurity becomes increasingly important in the crypto space, regular cybersecurity reviews will be key to staying on the cutting edge. Here’s what your business can do to prepare for a cybersecurity review, in order to get the most out of the experience.   Cryptocurrency businesses that take …

Advanced Considerations for CMMC Compliance

Advanced Considerations for CMMC Compliance

In an era where a cybercriminal looks for the weakest link, it is vital to maintain supply chain security. Supply chain threats are varied and include spear-phishing, third-party software vulnerabilities, and state-sponsored attacks. A recent mega cyber-attack traced to SolarWinds software impacted multiple government departments. The attack’s consequences demonstrate how insidious cyber-attacks are and how supply chain vendors are weaponized …

CISORG

Next Level Security: CIS Organizational Level Controls

The Center for Internet Security (CIS) offers a series of advisories for cybersecurity professionals. The advisories comprise of grouped actions that, when implemented, offer an effective defense-in-depth approach to a best practice security posture. In following the guidance of the CIS Controls, an organization can mitigate against the most common attacks on IT systems and networks.    One of the …

FedRAMP Requirements Explained

FedRAMP Requirements Explained

The Federal Risk and Authorization Management Program (FedRAMP) provides a framework to deliver  secure cloud services to federal government agencies. The program covers security assessment, authorization, and continuous monitoring of cloud products and services.    Any cloud service provider (CSP) that sells commercial cloud service offerings (CSO) to a federal agency must comply with FedRAMP. This article looks at some …

Image of man speaking to small audience

CMMC Levels 1-5 Explainer

A recent survey from Samsung shows the importance of implementing cybersecurity measures across an extended network. The survey points out that 64% of federal government IT and cybersecurity professionals see endpoint security breach prevention as a priority.    The Office of the Director of National Intelligence (ODNI) publishes an annual review that details the security threats facing the United States. In …

Foundational Security Controls from CIS

10 Foundational Security Controls from CIS

The saying – with knowledge comes power – holds as much in cybersecurity as anywhere. A vital part of a cybersecurity professional’s job is to know the threats to the enterprise assets and the severity of the impact of those threats. The framework for actionable controls and security best practices from the Center for Internet Security (CIS) provides this know-how …

A FedRAMP Primer to Secure Federal Enterprises

A FedRAMP Primer to Secure Federal Enterprises

A Guide to FedRAMP (Federal Risk and Authorization Management Program) to minimize cloud security risks for federal agencies.   Cloud computing creates hyperconnected services. The result is improved productivity for enterprises and more flexibility for the workforce. However, these benefits come with certain new risks.  Cloud enablement increases the number of attack points available for cybercriminals to exploit.    The …

A person's hands typing on a laptop with an unlocked padlock icon in the foreground.

2 Reasons You Should Get CMMC and Win More DoD Contracts  

Cybersecurity Maturity Model Certification (CMMC) will soon be a requirement for companies that work with the Department of Defense (DoD) if they want to bid on contracts. While certification is not yet available, DoD contractors can get started ahead of time by learning CMMC requirements and preparing a strategy for long-term cybersecurity fortification. Contractors that begin assessing their own practices …