Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Understanding the GLBA Safeguards Rule

The Gramm-Leach-Bliley Act (GLBA) aims to protect consumer financial privacy with three provisions: the Financial Privacy Rule, the Safeguards Rule, and the Pretexting Provisions. In our previous post, we covered the GLBA Financial Privacy Rule and what financial institutions, as defined by the GLBA, need to know to be compliant.

Calligo partners with BigID to accelerate Data Privacy, Security and Governance for our clients

Today, Calligo announced that we have partnered with BigID. The BigID data intelligence platform enables organizations to know their enterprise data and take action for privacy, security, and governance. This partnership will enable Calligo to provide clients with the ability to proactively discover, manage, protect, and gain more value from their regulated, sensitive, and personal data across their data landscape.

Is It Reasonable to Deploy a SIEM Just for Compliance?

Many organizations need to meet various compliance standards, and investing in a security information and event management (SIEM) solution can often help them reach that goal. But it worth the cost and effort to deploy a SIEM solution solely for compliance? Or is there a way to maximize the value of your SIEM by strengthening cybersecurity as well as achieving compliance? This article will help you answer those critical questions.

NeoSystems Strengthens Channel Program; Names Kathlyn Gibbs to Lead Effort as VP, Partners and Alliances

TYSONS CORNER, Va., May 3, 2022 – NeoSystems, a full-service strategic outsourcer, IT systems integrator and managed services provider to the government contracting market, is strengthening its channel program and has named Kathy Gibbs to lead this effort as Vice President, Partners and Alliances.

What Is COBIT?

COBIT is an acronym for Control Objectives for Information and Related Technologies. The COBIT framework was created by Information Systems Audit and Control Association, ISACA to bridge the crucial gap between technical issues, business risks and control requirements. COBIT is an IT governance framework for businesses that want to implement, monitor and improve their IT management best practices.

Compliance does not equal security: 7 cybersecurity experts share their insights

It is often stated that security is hard. Whether it is the people, processes, and technology, or any combination of the three, security is a never ending challenge. Conversely, compliance is the opposite. Compliance is relatively straightforward. For too long, and for too many organisations, meeting a compliance standard was seen as a satisfactory way to boast of security. The competing ideologies of security versus compliance have long vexed even the most optimistic cybersecurity professional.

CMMC 2.0 Certification Costs

With the release of CMMC 2.0, and the significant changes that come with it, we have to update our cost expectations. This post covers whether CMMC is appropriate for your business, provides a cost breakdown of the 3 major effort areas, offers a rough estimate of the costs of CMMC compliance, and answers the question of whether an expert can save you time and resources.

Proactive Compliance Verification for Network Security

Regulatory compliance can cost teams valuable time and money. Forward Enterprise's security posture verification can relieve this burden and prove that your network behavior conforms with corporate policy intent in real-time. In this demonstration, Technical Solutions Architect, Glen Turner shows us how operators can use Forward to prove the network meets PCI DSS regulatory requirements.

#BigPictureCyber Town Hall With Michael McLaughlin, UMD ARLIS | 4/27/22 | NeoSystems

NeoSystems #BigPictureCyber Town Hall Series: Join NeoSystems’ Chief Information Security Officer, Ed Bassett, for our weekly #BigPictureCyber Town Hall designed for the Defense Industrial Base and GovCon community. Each session features special guests and offers an opportunity for attendees to ask questions regarding CMMC and cybersecurity. Topics covered include CMMC compliance requirements, cybersecurity news, how to prepare for CMMC certification, and the latest updates from the CMMC AB.