Cimcor Blog

Podcast: Tom Cornelius Discusses CMMC
Podcast: Tom Cornelius Discusses CMMC
DATA SECURITY PODCAST In a recent podcast interview with Hillarie McClure, Multimedia Director of Cybercrime Magazine, and Tom Cornelius, who...
Podcast: Tony Sager Discusses Defense Strategies
Podcast: Tony Sager Discusses Defense Strategies
DATA SECURITY PODCAST In a recent podcast interview with Hillarie McClure, Multimedia Director of Cybercrime Magazine, and Tony Sager, SVP &...
Podcast: Tom Cornelius Discusses Compliance Challenges
Podcast: Tom Cornelius Discusses Compliance Challenges
DATA SECURITY PODCAST In a recent podcast interview with Hillarie McClure, Multimedia Director of Cybercrime Magazine, and Tom Cornelius, who...
9 CMMC Challenges to Overcome Prior to the Deadline
9 CMMC Challenges to Overcome Prior to the Deadline
Reaching compliance with a new framework is never a simple process. When it comes to the Cybersecurity Maturity Model Certification (CMMC) — one of...
How To Prepare for a CMMC Audit
How To Prepare for a CMMC Audit
CMMC is one of the most significant compliance shakeups of the last two decades.
The Top 10 Things to Know About CMMC
The Top 10 Things to Know About CMMC
In recent years, the DoD has undergone a series of bold cybersecurity initiatives, from embracing responsible vulnerability disclosure to the...
Podcast: Which is a Greater Cybersecurity Threat: Rogue Hackers or Nation States?
Podcast: Which is a Greater Cybersecurity Threat: Rogue Hackers or Nation States?
DATA SECURITY PODCAST In a recent podcast interview with Hillarie McClure, Multimedia Director of Cybercrime Magazine, and Michael A. Echols, CEO of...
CMMC Standards for DoD
CMMC Standards for DoD
In one of the biggest compliance shake-ups in a decade, the Department of Defense(DoD) has replaced its  self-assessment model with one of the most...
Winning the Trust of Customers and Partners with SOC 2 Compliance
Winning the Trust of Customers and Partners with SOC 2 Compliance
As security programs have matured, organizations have paid closer attention to the security of vendors and partners. Known as ‘supply chain risk’,...
Going Beyond Technology With CIS Organizational Controls
Going Beyond Technology With CIS Organizational Controls