CMMC Certification Challenges and Solutions

July 12, 2024

The Department of Defense (DoD) awarded more than $460 billion in contracts during its 2023 fiscal year. For businesses large…

Read More

FedRAMP JAB Authorization vs Agency Authorization

June 5, 2024

Cloud Service Providers (CSPs) that want to sell their Cloud Service Offerings (CSOs) to federal agencies must secure a Federal…

Read More

IoT Cybersecurity in Healthcare – Mitigating the Risk

June 5, 2024

In the era of digital healthcare, the integration of Internet of Things (IoT) devices has revolutionized patient care delivery, offering…

Read More

NIST Releases Four Draft Publications Focused on AI Security

May 7, 2024

The National Institute of Standards and Technology (NIST) released four draft publications designed to help organizations improve the safety, security,…

Read More

Change Healthcare Attack – What We Can Learn

April 30, 2024

On February 21, Change Healthcare went DOWN. The impact on the US healthcare system has been significant! The American Hospital…

Read More

Draft Rules Published for Cyber Incident Reporting Requirements

March 29, 2024

On March 27, the US Cybersecurity and Infrastructure Security Agency (CISA) published draft rules detailing requirements for critical infrastructure companies…

Read More

Early AI Security Standards: ISO/IEC 42001 & NIST AI RMF

March 22, 2024

Artificial Intelligence (AI) is a rapidly evolving technology that is expected to make major impacts on our business and personal…

Read More

Navigating the Changes in NIST CSF 2.0

February 27, 2024

On February 26, 2024, the National Institute of Standards and Technology (NIST) released the NIST Cybersecurity Framework (CSF) 2.0. The…

Read More

DoD Releases Video Detailing CMMC

February 16, 2024

The public comment period for the proposed Cybersecurity Maturity Model Certification (CMMC) rule is open until February 26, 2024. To…

Read More

Getting Started with Penetration Testing

February 7, 2024

What is Penetration Testing Penetration testing is a common procedure and an important element of an effective cybersecurity program. A…

Read More

Finding a credible expert with the appropriate background, expertise, and credentials can be difficult. CompliancePoint is here to help.