Cimcor Blog

9 CMMC Challenges to Overcome Prior to the Deadline
9 CMMC Challenges to Overcome Prior to the Deadline
Reaching compliance with a new framework is never a simple process. When it comes to the Cybersecurity Maturity Model Certification (CMMC) — one of...
How To Prepare for a CMMC Audit
How To Prepare for a CMMC Audit
CMMC is one of the most significant compliance shakeups of the last two decades.
The Top 10 Things to Know About CMMC
The Top 10 Things to Know About CMMC
In recent years, the DoD has undergone a series of bold cybersecurity initiatives, from embracing responsible vulnerability disclosure to the...
Podcast: Which is a Greater Cybersecurity Threat: Rogue Hackers or Nation States?
Podcast: Which is a Greater Cybersecurity Threat: Rogue Hackers or Nation States?
DATA SECURITY PODCAST In a recent podcast interview with Hillarie McClure, Multimedia Director of Cybercrime Magazine, and Michael A. Echols, CEO of...
CMMC: The New Cybersecurity Standard for Defense Contractors
CMMC: The New Cybersecurity Standard for Defense Contractors
In one of the biggest compliance shake-ups in a decade, the Department of Defense(DoD) has replaced its  self-assessment model with one of the most...
Winning the Trust of Customers and Partners with SOC 2 Compliance
Winning the Trust of Customers and Partners with SOC 2 Compliance
As security programs have matured, organizations have paid closer attention to the security of vendors and partners. Known as ‘supply chain risk’,...
Going Beyond Technology With CIS Organizational Controls
Going Beyond Technology With CIS Organizational Controls
 
What to Expect with Brazil's Data Protection Law 
What to Expect with Brazil's Data Protection Law 
Passed by the National Congress of Brazil in 2019, the Brazilian General Data Protection Law(Lei Geral de Protecao de Dados or LGPD) is slated to...
Breaking Down CIS Foundational Controls
Breaking Down CIS Foundational Controls
Effective cybersecurity programs many times utilize a layered approach. Spending a vast sum on advanced protection systems can be pointless if the...
Preventing Cyber Attacks With CIS Basic Controls
Preventing Cyber Attacks With CIS Basic Controls
Enterprise-level organizations have access to a vast range of security tools, resources, standards, and advice. Utilizing free and paid threat feeds,...