Resources
First Steps when Executing a Cyber Incident Response Plan
The initial stages of incident response are frequently the most important. Incidents always involve elements of the unknown and unexpected. If this weren’t the case, then the events causing the incident should be prevented outright. This inevitable, initial lack of full understanding of the incident can cause panic and disorganization, which reduces the effectiveness of …
First Steps when Executing a Cyber Incident Response Plan Read More »
Managed Security Services Ultimate Guide
What is a Managed Security Services Provider (MSSP)? An MSSP is a specialized cyber security team that provides outsourced monitoring and management of systems, device endpoints, and users. Managed Security Services Providers utilize high-tech centers for security operations to provide 24/7/365 services.
How to Future Proof Your Information Security Strategy with PenTesting
What cyberthreats will your organization face in the next few years? Can you protect your business’s critical data? Do you know what would happen if trained hackers attempted to break into your systems?
An Introduction to the NIST Cybersecurity Framework
What is the NIST Cybersecurity Framework? The Cybersecurity Enhancement Act of 2014 amended the role of the National Institute of Standards and Technology (NIST) to include the identification and development of cybersecurity risk frameworks. Through this act, NIST was tasked with identifying a “prioritized, flexible, repeatable, performance-based, and cost-effective approach, including information security measures and …
An Introduction to the NIST Cybersecurity Framework Read More »
Evolving Threats and Standards for Defense Contractors: An Introduction to CMMC 2.0
The Pentagon is encouraging defense contractors to adhere to the new cybersecurity practices illustrated by the National Institute of Standards and Technologies. According to a Defense Department official, about 40,000 companies will still require a third-party assessment under the revamped Cybersecurity Maturity Model Certification program, called CMMC 2.0. CMMC 2.0 has an updated program structure …
Evolving Threats and Standards for Defense Contractors: An Introduction to CMMC 2.0 Read More »
TDR, NDR, ETD, EDR: Concepts of Threat Detection and Response
What is Threat Detection and Response (TDR)? Threat Detection and Response (TDR) is the practice of deep analysis of security ecosystems to identify bad actors or irregular behaviors that could lead to compromises on the network. TDR helps Managed Security Service Providers (MSSPs) and Security Operation Centers (SOC) teams detect malicious network activity and stop …
TDR, NDR, ETD, EDR: Concepts of Threat Detection and Response Read More »
The Importance of Continuous Security Monitoring (CSM)
Cybercrime has escalated. Small and medium-sized businesses and associations are now prime targets for attack. Cybersecurity Ventures forecasts that global ransomware damage costs will reach $265 billion annually by 2031, with a new attack every two seconds as ransomware software matures and extortion techniques, including social engineering, are refined by bad actors.
The Keys to CMMC Compliance-#2
Second CMMC series webinar answered questions about CUI. In case you missed this event, the recording is available here.
The Keys to CMMC Compliance- NIST 800-171 Self-Assessment and the CMMC
ATS’s kick-off webinar in the 2021 CMMC series was a huge success! In addition to covering the DFARS Interim Rule, we also answered several audience questions relating to CUI. In case you missed this event, the recording is available here!