09 Jun InfoSec Strategies | Category - Pivot Point Security Real-World Time and Effort to Implement PreVeil Encrypted Email and File Sharing January 14, 2024 By Richard Barrus If your business needs to comply with the Cybersecurity Maturity Model Certification (CMMC) framework, you may have heard about PreVeil... Continue reading
08 Jun InfoSec Strategies | Category - Pivot Point Security 4 Top Tools for Maximum CMMC Compliance Benefit with Minimum Effort June 20, 2024 By Richard Barrus Many SMBs in the US defense supply chain are rightly concerned about the high level of effort that is potentially required to achieve c... Continue reading
07 Jun InfoSec Strategies | Category - Pivot Point Security CMMC Compliant Access Control: How PreVeil Can Help You Get There January 12, 2024 By Richard Barrus The Cybersecurity Maturity Model Certification (CMMC) framework groups cybersecurity controls into 17 domains. Each domain defines vari... Continue reading
04 Jun InfoSec Strategies | Category - Pivot Point Security What is a Zero Trust Security Model and Why Should We (as a Business with Sensitive Data) Care? January 15, 2024 By Richard Barrus In recent weeks the global cyber community has been hit broadside by two devastating attacks—the SolarWinds hack and the Microsoft Exch... Continue reading
03 Jun Compliance | Category - Pivot Point Security, Cybersecurity | Category - Pivot Point Security, Government | Category - Pivot Point Security Why a Technical Geek Might Not Be the Best Choice to Run Your CMMC Program January 15, 2024 By Richard Barrus The new Cybersecurity Maturity Model Certification (CMMC) requirements are coming up fast for SMBs in the Department of Defense (DoD) s... Continue reading