Compliance


By Emily Newton, Editor-in-Chief at Revolutionized Magazine The United States Department of Defense (DoD) announced CMMC 2.0 in November 2021. Fully rolling out this new version of the DoD’s Cybersecurity Maturity Model Certification will likely take until 2023. Even with that forgiving on-ramp for becoming compliant, there are definite advantages to […]

How Do DoD Suppliers Benefit by Adapting to CMMC 2.0 ...


By Zachary Amos, Features Editor at ReHack Organizations, contractors, and subcontractors in the Defense Industrial Base (DIB) sector must understand the implications and requirements of the Department of Defense’s (DoD) Cybersecurity Maturity Model Certification (CMMC). On Nov. 4, 2021, the U.S. DoD announced the CMMC 2.0, an updated iteration of the […]

CMMC 2.0: 5 Steps to Get Prepared


By Emily Newton, Editor-in-Chief at Revolutionized Magazine The software-as-a-service (SaaS) sector provides customers tremendous convenience and cost-saving potential. It’s often much easier for them to sign up for a subscription-based product that does not require expensive hardware upgrades. However, the SaaS industry can interfere with cybersecurity compliance if internet security leaders […]

Now Is the Perfect Time to Optimize SaaS Cybersecurity Compliance



In Episode S4E2 our guest is David Vincent, VP of Product Strategy and the chief security evangelist at Appsian Security. Our topic is Automated Controls for Compliance – How and Why.Appsian provides ERP security below the network layer. David shares his insights about: Challenges associated with manually maintaining compliance. How […]

Automated Controls for Compliance – How and Why


In Episode S3E6 our guest is Brian Hajost, President and Founder of SteelCloud, a company that develops technology for automated remediation of endpoints to effectively meet compliance mandates. In this fun and informative conversation, Brian delves into what it means for organizations to meet the various compliance mandates they are […]

Automated Remediation


DoD Supply Chain Can Now Benefit From Steel Root’s Unique CMMC Compliance Services in Combination With Zscaler’s FedRAMP-Authorized Zero Trust Secure Access Technology SALEM, MA (March 2021) – Steel Root, a leading cybersecurity services firm that specializes in compliance for the U.S. Defense Industrial Base, announces that they have partnered with Zscaler, Inc. to […]

Steel Root Partners with Zscaler to Support CMMC Requirements for ...



By Brian Stone, SVP Customer Success, FairWarning & Elizabeth Champion, VP and Chief Compliance Officer, FMOLHS From ensuring an organization meets regulatory requirements to preserving personal health information (PHI), healthcare compliance teams face a myriad of challenges to safeguard patient data. Oftentimes privacy, compliance, and security departments are siloed across […]

Working in Harmony to Create a Culture of Compliance


By Kirsty Fisher, Chief Financial Officer at Titania In 2019, Microsoft made waves at its annual Black Hat conference in Las Vegas, where it confirmed its discovery of a malicious hacker group which was using common Internet of Things (IoT) devices to carry out widespread corporate attacks. The way in? Internet connected devices including […]

Compliance in a Connected World


Any executive accountable for enabling the efficient and effective governance of cybersecurity risks will invariably agree that during compliance and risk projects, manual processes waste time and resources. Automated platforms are available, but it is not uncommon to hear of frustration with the time, level of effort, and cost associated […]

Automation and Visibility to Your Compliance and Risk Management Program



I want to introduce you to David. David is the Chief Information Security Officer for a sizeable financial institution. He is an educated career professional, a loving husband, and a devoted father. He takes his job as CISO very seriously. The responsibility of protecting his organization’s digital assets, including sensitive […]

A Security Patch for Your People


As millions of workers move from the confines of their employer’s network to apply safe physical distancing measures by working from home, securing data gets more complicated. Providing adequate protection for your critical data can be even more challenging if your VPN just wasn’t designed for the level of traffic […]

The Importance of Extending Your Security Policies to the Cloud