Security and Compliance

Explore related topics in this category

Ransomware Protection in Microsoft Office 365

Ransomware Protection in Microsoft Office 365

Ransomware is an increasingly prevalent threat to company networks and data. New threats are emerging every day. That means that you need to protect your entire enterprise. Therefore, use tools meant to prevent....

What is CMMC (Cybersecurity Maturity Model Certification)?

What is CMMC (Cybersecurity Maturity Model Certification)?

The Department of Defense DoD recently announced the introduction of a new program called the Cybersecurity Maturity Model Certification CMMC whi...

JEDI Is Awarded: What Does JEDI Mean for Government Contractors?

JEDI Is Awarded: What Does JEDI Mean for Government Contractors?

If you work in government cloud contracting, you already know about the recent JEDI contract award. Over $10 billion in one contract and there are many more large contracts in the works....

NIST 800-207 - NIST Offers Zero Trust Architecture Guidance

NIST 800-207 - NIST Offers Zero Trust Architecture Guidance

The National Institute of Standards and Technology recently released a draft special publication for Zero Trust Architecture (ZTA), with the aim of establishing a standard classification criterion for ZTA components...

Healthcare Collaboration and Communication With Microsoft Teams

Healthcare Collaboration and Communication With Microsoft Teams

Healthcare employees face a dilemma Communication and collaboration are essential to successful patient outcomes but confidentiality requirements co...

Best Practices for DevSecOps in Azure

Best Practices for DevSecOps in Azure

The DevSecOps approach to releasing and maintaining software has largely replaced the old way of having separate teams for development and administrat...

Understanding Microsoft Compliance Manager

Understanding Microsoft Compliance Manager

Many of the biggest risks in cloud usage have to do with compliance requirements The penalties for being lax about privacy security and data protec...

11 State Laws Privacy and Security Compliance Requirements

11 State Laws Privacy and Security Compliance Requirements

Since the implementation of the European Unions General Privacy Data Protection Regulation GDPR in May 2018 thousands upon thousands of Europeanb...

What is Microsoft's Windows AutoPilot?

What is Microsoft's Windows AutoPilot?

Windows AutoPilot introduces a faster more reliable way to deploy windows and applications to devices For most IT pros configuring Windows OS on ne...

Fast Tracking NIST (CSF) Compliance in Office 365

Fast Tracking NIST (CSF) Compliance in Office 365

Are you wondering how to meet NIST compliance in Office 365 As NIST CSF versions 11 rolls out and private and government agencies around the world...