Category: Uncategorized

Changing Your Approach to Protecting Digital Identity

Changing Your Approach to Protecting Digital Identity

Security breaches make headline news. Even the most seemingly secure and untouchable organizations are vulnerable as security measures are only as effective as the weakest link. Most recently, Equifax was compromised, potentially exposing vital information of half of...
Taking Steps Toward DFARS Compliance: Encryption of Data at Rest

Taking Steps Toward DFARS Compliance: Encryption of Data at Rest

Continuing the topic of my recent blog posts, Government Contractors who store or transmit Covered Defense Information (CDI) are required to comply with the 14 control families of the NIST SP 800-171 by December 2017. The DFARS 252.204-7008 clause dictates the...
Part Three: FAR Ruling 52.204-21 Definitions

Part Three: FAR Ruling 52.204-21 Definitions

This is part three of a continuing series on the Federal Acquisition Register ruling 52.204-21, Basic Safeguarding of Covered Contractor Information Systems.  If you haven’t read part one or part two,  please take a few minutes to read it before continuing. The recent...
How Banks Need to Rethink Their Approach to Cybersecurity

How Banks Need to Rethink Their Approach to Cybersecurity

The financial industry is beginning to recognize that cybersecurity is no longer a part of the information technology department but has greater importance throughout the entire business workflow. As the growing complexity of cyber threats continues to pose serious...

Contact Cybersheath

By completing this form, I consent to receiving calls, texts and/or emails from Cybersheath regarding services and programs.