
How You Can Prepare for CCPA Enforcement
On October 10 2019 the Office of California Attorney General Xavier Becerra announced public regulations of the California Consumer Privacy Act CC...

Ransomware Protection in Microsoft Office 365
Ransomware is an increasingly prevalent threat to company networks and data. New threats are emerging every day. That means that you need to protect your entire enterprise. Therefore, use tools meant to prevent....

What is CMMC (Cybersecurity Maturity Model Certification)?
The Department of Defense DoD recently announced the introduction of a new program called the Cybersecurity Maturity Model Certification CMMC whi...

JEDI Is Awarded: What Does JEDI Mean for Government Contractors?
If you work in government cloud contracting, you already know about the recent JEDI contract award. Over $10 billion in one contract and there are many more large contracts in the works....

NIST 800-207 - NIST Offers Zero Trust Architecture Guidance
The National Institute of Standards and Technology recently released a draft special publication for Zero Trust Architecture (ZTA), with the aim of establishing a standard classification criterion for ZTA components...

Cost Control in AWS
This information is provided by our friends at VictoryCTO specialists in stylefontweight 400Digital Transformation in AWSstylefontw...