Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Posts

[Guide] An In-Depth Look at Common Controls and the RMF

When it comes to implementing security controls throughout an organization, there are a lot of cases where the work may be doubled, tripled, quadrupled or more by having to “reinvent the wheel” multiple times. It’s a common problem, but fortunately, it also has a common solution: common controls. What does all of this mean? Let’s dig in.

What is a POAM and How Is It Used for CMMC Compliance?

Whether you’re a long-time cloud services provider or services business looking into dipping your toes into government contracts, or a new startup aiming to become a government services business, you’re likely encountering a dense wall of acronyms, paperwork, auditing, and standards that stymies your business growth.

ATO Process: What is an Authority to Operate in Cybersecurity?

When a business works with the general public, there’s a certain level of risk inherent in the process. We see it time and time again, with companies subject to data breaches and the loss of public information, like what happened to Target in 2013, Equifax in 2017, 23andMe in 2023, and many, many more. While there are security standards in place for private corporations, enforcement is slim, and violations tend to be retroactively applied.

Significant Changes from NIST SP 800-53 rev4 to rev5

The National Institute of Standards and Technology has introduced a new revision of the Special Publication 800-53, revision 5. As with any document change of this scope there are minor and major changes. This paper will provide a high level overview of the significant changes, addressing a redefined focus in control families, accountability, governance, as well as a discussion of new control families, privacy transparency and supply chain risk management.

FedRAMP ATO, P-ATO & Certification: What's the Difference?

FedRAMP JAB ATO, P-ATO, and Certification can be a tricky set of requirements to navigate, and the confusion starts early. For example, what are any of those terms, and what do they mean? While some of you already know, everyone has to learn somewhere, so let’s go through and define them, what they mean, and what you need to do to adhere to them. Beyond that, we’ll help you navigate the process and find the best way to get the accreditation status you need.

Understanding FedRAMP System Boundary

In the ever-changing world of technology, staying secure is a top priority for many organizations. Identifying and documenting system boundaries is essential for keeping data safe and secure, but what does this mean? In this article, we’ll explore FedRAMP System Boundary, how to identify them, and how to generate FedRAMP System Boundary diagrams.

Understanding FedRAMP System Boundaries

In the ever-changing world of technology, staying secure is a top priority for many organizations. Identifying and documenting system boundaries is essential for keeping data safe and secure, but what does this mean? In this article, we’ll explore system boundaries, how to identify them, and how to generate system boundary diagrams. By the end of this guide, you’ll be well-versed in understanding system boundaries and creating diagrams that can help keep your information secure!

Unveiling the Future of AI in Cybersecurity

Welcome to our latest podcast episode, where we delve into the fascinating realm of AI in cybersecurity. Phil Agcaoili, the esteemed entrepreneur, and former CISO professional, joins us in this fascinating discussion. Alongside our hosts, Max Aulakh and Joel Yonts, we unravel the profound impact of artificial intelligence on cybersecurity, compliance, and the workforce.