The evolution of CMMC is here - introducing CMMC 2.0

Welcome to the Evolution of Cybersecurity Maturity Model Certification – CMMC 2.0

Back in September, we wrote a blog about the Cybersecurity Maturity Model Certification (CMMC) program. In it, we explained how the Department of Defense introduced CMMC in 2019 to strengthen cybersecurity standards for Department of Defense (DoD) contractors.  CMMC builds a set of cybersecurity requirements into acquisition programs. It’s designed to help provide the DoD with confirmation that firms within the Defense Industrial Base (DIB) are meeting those requirements.   Why a Change from CMMC 1.0 to 2.0?  […]

Blog Cybersecurity Fraud Detection
Phantom employees don't work for your company but they collect paychecks.

Identifying and Preventing Payroll Fraud: Phantom Employees

SP6 “What You Need to Know” Series (Article 2 of 3)  No business is immune to payroll fraud. It costs U.S. companies millions of dollars each year.  Despite its prevalence, many organizations have no idea they’re victims of this type of theft. That’s because it can be extremely difficult to detect. Consider these facts: According to the 2020 Report to the Nations released by the Association of Certified Fraud Examiners (ACFE), organizations […]

Blog Cybersecurity Splunk Administration

Splunk Cloud Responsibilities: What Do I Manage and What Does Splunk Manage?

Are you considering Splunk’s cloud-based software-as-a-service (SaaS) solution? If so, you’re in good company. Splunk Cloud is an increasingly popular alternative to deploying Splunk on-premises, or in your own cloud environment. This is because Splunk Cloud: Removes the necessity of buying and managing the Splunk infrastructure. Eliminates a significant portion of the administrative overhead tied […]