Blog

FISMA Requirements Emphasize Continuous Monitoring

FISMA requirements place emphasis on how agencies monitor their security controls. Security controls move toward optimization, and continuous monitoring becomes endemic to your process.

Blog

IT Compliance Management: A Holistic Approach

As IT compliance experts we take a holistic approach when delivering our services. Our team members draw on insider industry knowledge to help you achieve IT compliance management in a way that is practical and relevant to your organization.

Blog

The FISMA Audit: Identifying Gaps

What are the main components of a FISMA audit? This article covers what you should include in your FISMA audit.

Blog

Healthcare Security: 5 Ways to Safeguard PHI Data

The healthcare industry needs to accept that it is on them to anticipate these threats, and to adequately prepare for them. This article covers five security tips for healthcare organizations.

Blog

FISMA: Risk-based Decision-making

Many of the mandated FISMA safeguards will keep your data safer. But a smart organization will adopt a broader perspective on protecting data by taking a risk-based approach and figuring out what’s at stake behind each decision.

Blog

Why Security Fails and What You Can Do About It

Here are four of the most frequently seen problems in security programs, and specific ways you can address them and make your organization more secure.

Blog

FISMA Reform is Here: What Has Changed?

Let’s take a look at how are the FISMA guidelines are changing, and what steps we can take to streamline the transition.

Blog

The Anthem Breach: Another Wake Up Call

It was announced that an Anthem database was hacked, compromising a possible 80 million records.

Blog

Security in the Cloud

Cloud-based services offer companies convenience, including easy access to data from pretty much anywhere and quick setup. But relying on the cloud has its drawbacks and risks.