Focus on Security: Vetting Your Supply Chain

Cybersecurity Vendor Vetting

In business, trends often start at the top. The largest companies are the first to adopt new practices, and once they have been refined and proven effective, the ideas trickle down to smaller organizations. That’s certainly the case with cybersecurity. The world’s largest organizations recognized the value of data early, taking steps to secure their […]

The CMMC Proposed Rule: Facts and Fiction

CMMC Proposed rule

The CMMC Proposed Rule comes with lots of emotion. To help you separate fact from fiction, we sat down with our CMMC experts and asked the questions on everyone’s mind. Why is CMMC happening? The DoD addressed this query. “Because of the across-the-board risks of not implementing cybersecurity requirements, DoD was unable to identify any […]

Supply Chain Security and Your Small-to-Medium Business

Small Business

When your credit card was skimmed at the local gas station, you stopped going there for a fill-up. When an online retailer was hacked, and your information was stolen, you got smarter about sharing data. When an odd text message asks you to click the link, you delete it. As consumers, we’re well aware of […]

Small businesses need to secure data before tapping into AI

AI is the acronym on everyone’s lips this summer. Generative AI tools have gone mainstream, and nearly everyone has heard an AI use case that piques their interest. But you’ve got questions about the cost, the security, and how to use your data because you’re a small business, not an enterprise with massive resources. AI […]

The coming cyber reckoning for federal contractors

The coming cyber reckoning for federal contractors

All signs point to contractor cybersecurity this fall as OASIS+ contracts are awarded and the Cybersecurity Maturity Model Certification moves toward a final rule. OASIS+ will set the pace as it is the General Services Administration’s government-wide, multi-agency, multiple-award, indefinite-delivery, indefinite-quantity contract for non-IT services. The awards started rolling out on July 30, giving awarded […]

4 Tips to Elevate Your Company’s Cybersecurity

Boost Cybersecurity with National Standards

Panelists speak at the Potomac Officers Club’s 2024 Cyber Summit. Photo by Andrew Noh. The cyber threat landscape is ever changing, and businesses can’t afford for their cybersecurity posture to lag behind. According to cyber experts, there are a few key tips that can help organizations of any size improve their cyber hygiene and better […]

Breaking Down the 2024 Cyber Summit

2024 Cyber Summit

On June 6, the Ritz-Carlton, Pentagon City was packed with over 300 knowledgeable cybersecurity experts and government contracting industry professionals for the Potomac Officers Club’s 2024 Cyber Summit. It was a full day of fast-paced networking, in-depth speeches and exciting panel discussions.   Below you’ll find highlights worth remembering from the day’s sessions. To browse […]

Screening Your Supply Chain: How Far Will You Go For Cybersecurity?

Supply Chain

Cybersecurity is like a game of “telephone” where you whisper a phrase to the next person in line. One mistake in the chain passes to others, changing the outcome. While the slip-ups are fun for a party game, no one is amused by a breach or hack in their extended network. With serious consequences on […]

How First-Person Stories Can Make Cybersecurity Lessons More Memorable

Cybersecurity Training

Despite working in cybersecurity and hearing about all types of incidents, I was riveted as my friend described how the attack rolled out and how employees reacted. In fact, I thought about the story several times during the next week and shared it with multiple people. It turns out the story was a teachable moment. […]

DTS Founder Edward Tuorinsky Proposes ‘Robust Response’ to Ensure Compliance With NIST SP 800-171 Revision

A “robust response” to the upcoming release of the third revision of National Institute of Standards and Technology Special Publication 800-171 must feature three elements, according to Edward Tuorinsky, the founder of and managing principal at cyber, consulting and management services provider DTS. Organizations must first evaluate the compliance of their security posture with the […]