A law passed by Congress late last year allocated $1 billion in cybersecurity grants for state and local governments to improve their digital defenses.
We’ve said it before: The Department of Defense Cybersecurity Maturity Model Certification (CMMC) Program is extremely complex. Contractors working within the Department of Defense supply chain must create detailed processes to show they can satisfy the DoD’s tightened data security requirements. As a first step, contractors should focus on successfully auditing their practices and meeting […]
Editor’s Note: This article is co-authored by Barry Duncan, Team Lead, Professional Services Observability; and Chase Yates, Practice Manager, Security. A common problem technology teams face is the high volume of noise in their environments and the resulting alert fatigue. Items clamoring for an analyst’s attention can include: Threats Anomalies Incidents Notable Events According to […]
SP6 “What You Need to Know” Series (Article 3 of 3) Many people are surprised to discover how prevalent employee fraud – including timecard fraud – is in our country. It can be found at businesses of all sizes and in nearly every industry. Consider these statistics from the ACFE 2020 Report to the Nations, released by the Association […]
Back in September, we wrote a blog about the Cybersecurity Maturity Model Certification (CMMC) program. In it, we explained how the Department of Defense introduced CMMC in 2019 to strengthen cybersecurity standards for Department of Defense (DoD) contractors. CMMC builds a set of cybersecurity requirements into acquisition programs. It’s designed to help provide the DoD with confirmation that firms within the Defense Industrial Base (DIB) are meeting those requirements. Why a Change from CMMC 1.0 to 2.0? […]
SP6 “What You Need to Know” Series (Article 2 of 3) No business is immune to payroll fraud. It costs U.S. companies millions of dollars each year. Despite its prevalence, many organizations have no idea they’re victims of this type of theft. That’s because it can be extremely difficult to detect. Consider these facts: According to the 2020 Report to the Nations released by the Association of Certified Fraud Examiners (ACFE), organizations […]
Are you considering Splunk’s cloud-based software-as-a-service (SaaS) solution? If so, you’re in good company. Splunk Cloud is an increasingly popular alternative to deploying Splunk on-premises, or in your own cloud environment. This is because Splunk Cloud: Removes the necessity of buying and managing the Splunk infrastructure. Eliminates a significant portion of the administrative overhead tied […]
SP6 “What You Need to Know” Series (Article 1 of 3) You may be surprised to discover how widespread payroll fraud is. It’s a white-collar crime affecting businesses of all sizes and touching nearly every industry. Consider the following: According to the FBI, $3.5 billion was reported lost in the U.S. as a result of payroll […]
If you work in the cybersecurity sector, you know that the U.S. Department of Defense (DoD) is rolling out a Cybersecurity Maturity Model Certification program, or CMMC, to create stronger cybersecurity standards for contractors working in the DoD supply chain. Over 300,000 firms either currently do business within the Defense Industrial Base (DIB) or intend […]
Learn three Splunk deployment best practices that will go a long way in saving you time and face, and allow you to spend your evenings unwinding in peace.