CMMC compliance explained: what is the Cybersecurity Maturity Model Certification?

October 15, 2020 | Mark Stone
Mark Stone

Mark Stone

Mark Stone is a content and copy writer with over a decade of experience covering technology, business, and cybersecurity. Earlier in his career, he was a cybersecurity analyst in the public sector. He lives in Kelowna, BC with his wife and two black cats.

October 15, 2020 | Mark Stone

CMMC compliance explained: what is the Cybersecurity Maturity Model Certification?

This blog was written by a third party author With an escalating cybersecurity threat risk that doesn’t appear to be slowing down, the Department of Defense (DoD) has taken proactive measures in creating the Cybersecurity Maturity Model Certification (CMMC). The CMMC will soon be a requirement for any defense contractors or other vendors that are, or wish to…

September 23, 2020 | Mark Stone

What is mobile device management? MDM explained

This blog was written by a third party author. Not too long ago, the desktop computer was the primary computing device for enterprise employees. With the rise of mobile endpoints like smartphones, laptops and tablets, employees are connecting to corporate networks from a wide variety of places and devices. Today, especially with the popularity of the WFH (work from home)…

Get the latest
security news
in your inbox.

Subscribe via email

RSS

September 10, 2020 | Mark Stone

Firewalls explained: the different firewall types and technologies

This blog was written by a third party author. Finding the right network security tools to secure your sensitive data can be a significant challenge for any organization. Choosing a firewall may seem like a simple task, but companies can get overwhelmed by the different firewall types and options. Making the distinction between a firewall and other security solutions can…

September 9, 2020 | Mark Stone

What is Incident Response?

This blog was written by a third party author. As new types of security incidents are discovered, it is absolutely critical for an organization to respond quickly and effectively when an attack occurs. When both personal and business data are at risk of being compromised, the ability to detect and respond to advanced threats before they impact your business is…

August 26, 2020 | Mark Stone

IoT security explained

This blog was written by a third party author. The Internet of Things (IoT) is a term used to describe a system of interconnected computing devices that use the internet to send and receive data without requiring human to computer or human to human coordination. The world of IoT encompasses a wide variety of technologies, vendors, and connectivity methods. While…

August 19, 2020 | Mark Stone

Zero Trust Network Access (ZTNA) explained

This blog was written by a third party author In today’s ever-changing cybersecurity landscape, Zero Trust is here to stay. Before the concept of Zero Trust was well known, organizations followed the belief that anything within the network is trusted, and anything outside of it is untrusted. Zero trust is built on the idea that all traffic, whether…

August 12, 2020 | Mark Stone

What is endpoint protection? Endpoint security explained

This blog was written by a third party author. 5G is here and changing the way business is done. With this comes an increase of devices to take advantage of low latency and high bandwidth that will allow businesses to truly transform. Because of those devices, the attack surface is also rapidly expanding and will increase opportunities for bad actors.…

July 31, 2020 | Mark Stone

Secure remote access explained

This blog was written by a third party author As the business world adjusts to the chaotic landscape of today’s economy, securing access from remote devices and endpoints has never been more critical. Equally critical is the requirement for organizations and their employees to practice good security hygiene. With the rising number of endpoints (laptops, servers, tablets, smartphones)…

July 8, 2020 | Mark Stone

Zero Trust security model explained: what is Zero Trust?

This blog was written by a third party author What is Zero Trust? Zero Trust is a cybersecurity model with a tenet that any endpoint connecting to a network should not be trusted by default. With Zero Trust, everything and everyone— including users, devices, endpoints —must be properly verified before access to the network is allowed. The protocols…