We’ve said it before: The Department of Defense Cybersecurity Maturity Model Certification (CMMC) Program is extremely complex. Contractors working within the Department of Defense supply chain must create detailed processes to show they can satisfy the DoD’s tightened data security requirements. As a first step, contractors should focus on successfully auditing their practices and meeting […]
Editor’s Note: This article is co-authored by Barry Duncan, Team Lead, Professional Services Observability; and Chase Yates, Practice Manager, Security. A common problem technology teams face is the high volume of noise in their environments and the resulting alert fatigue. Items clamoring for an analyst’s attention can include: Threats Anomalies Incidents Notable Events According to […]
Many people are surprised to discover how prevalent employee fraud – including timecard fraud – is in our country. It can be found at businesses of all sizes and in nearly every industry. Consider these statistics from the ACFE 2020 Report to the Nations, released by the Association of Certified Fraud Examiners: Occupational fraud costs […]
Back in September, we wrote a blog about the Cybersecurity Maturity Model Certification (CMMC) program. In it, we explained how the Department of Defense introduced CMMC in 2019 to strengthen cybersecurity standards for Department of Defense (DoD) contractors. CMMC builds a set of cybersecurity requirements into acquisition programs. It’s designed to help provide the DoD with confirmation that firms within the Defense Industrial Base (DIB) are meeting those requirements. Why a Change from CMMC 1.0 to 2.0? […]
SP6 “What You Need to Know” Series (Article 2 of 3) No business is immune to payroll fraud. It costs U.S. companies millions of dollars each year. Despite its prevalence, many organizations have no idea they’re victims of this type of theft. That’s because it can be extremely difficult to detect. Consider these facts: According to the 2020 Report to the Nations released by the Association of Certified Fraud Examiners (ACFE), organizations […]
Are you considering Splunk’s cloud-based software-as-a-service (SaaS) solution? If so, you’re in good company. Splunk Cloud is an increasingly popular alternative to deploying Splunk on-premises, or in your own cloud environment. This is because Splunk Cloud: You might be thinking that adopting Splunk Cloud will free your organization of any Splunk Cloud responsibilities. However, that […]
SP6 “What You Need to Know” Series (Article 1 of 3) You may be surprised to discover how widespread payroll fraud is. It’s a white-collar crime affecting businesses of all sizes and touching nearly every industry. Consider the following: According to the FBI, $3.5 billion was reported lost in the U.S. as a result of payroll […]
If you work in the cybersecurity sector, you know that the U.S. Department of Defense (DoD) is rolling out a Cybersecurity Maturity Model Certification program, or CMMC, to create stronger cybersecurity standards for contractors working in the DoD supply chain. Over 300,000 firms either currently do business within the Defense Industrial Base (DIB) or intend […]
To say a lot has change in 2020 is an understatement. The world we live in and work in has dramatically changed these past few months and some changes might last even longer. But even in this unpredictable world, we still look at data to help us solve our problems.
No matter the size of your organization, deploying Splunk in your environment is a big decision. After all, it can scale from very small to very large. Furthermore, it can be used as an on-premise hardware, or as a service to run within the Cloud. Perhaps you’re wondering if you should go with Splunk Enterprise […]