Stars-image

Blog

Welcome to Silent Sector's blog, news, and resource area.
0 Comments

The US Government Wants You(r) Cloud Application!

Have a great cloud application that is successful in the private marketplace and considering selling to the federal government? There is a proven path to do this that could propel your company to financial success and reputational notoriety by getting a Federal cloud authorization! Government sales of cloud applications and cloud services can be very lucrative - but first, let’s answer some basic questions about this process to understand it more.

Read More
0 Comments

CMMC 2.0 - What Changed?

The Cybersecurity Maturity Model Certification (CMMC) is a third-party assessment program created by the DoD to gauge the maturity of an organization's cybersecurity practices and verify the protection of Federal Contract Information (FCI) as well as Controlled Unclassified Information (CUI). When CMMC 1.0 was released in 2017, there were concerns amongst government contractors as it was incredibly pricey for small organizations, contained vague language of CMMC assessment process, and did not include a lot of overlap in cybersecurity requirements to other federal requirements or commonly accepted standards.

Read More
0 Comments

Cybersecurity for Education SaaS - EdTech

Educational Technology or “EdTech” is a discipline of Technology focused solely on the development of Software as a Service (SaaS) to improve student learning. Despite EdTech sounding field-specific, its impact is far-reaching as education or even the lack of it touches everyone’s life. This blog will dissect how cybersecurity intersects with EdTech.

Read More
0 Comments

The "Big 4" Methods of Building a Cybersecurity Program

Companies looking to build a cyber risk management program have four options. This video describes the various options, plus pros and cons of each. It is important to understand what is available so you can make the best choice for your organization's protection and longevity.

 

Read More
0 Comments

5 Key Traits to Look for In a Virtual CISO

For some time now, organizations around the globe have been met with looming cybersecurity threats, increased pressure from stakeholders, and catastrophic internal IT Security fatigue. As a result, one of the most in-demand leadership positions is the Chief Information Security Officer. Just like numerous other “as a service” platforms, the rise of “CISO as a Service” or Virtual CISO (vCISO) has also become a major game-changer for emerging and medium-sized businesses, allowing them to gain the same cybersecurity direction as a large enterprise, but at a fraction of the cost.

Read More
0 Comments

Virtual CISO (vCISO) Pros and Cons

For most of the 2000s, companies without an IT department seemed doomed to fail. Amazon is a prime example of what is possible with the internet and innovative leadership (pun intended). Times have changed. It now it seems like organizations are doomed for humiliation without a proper cybersecurity program and consequently a Chief Information Security Officer (CISO) for cybersecurity direction.

Read More
0 Comments

Credit Union Cyber Risk Assessments - NCUA Risk Assessment

Wouldn’t it be a dream come true if you could predict the future and know what market changes, natural disasters (or pandemics), and cyber threats will occur around your organization? While we don’t have a hack for this, we do know a risk assessment helps prepare your organization for any unforeseen circumstances such as these.

Read More
0 Comments

NIST SP 800-171a vs. CMMC

Government contractors today are constantly under the scrutiny of security compliance. After all, breaching a government contractor is an efficient path to stealing valuable U.S economic as well as national security information. These attaches are actively carried out by nation-state threat actors. Several years ago, the Department of Defense (DoD) worked with the National Institute of Standards and Technology (NIST) to create a security manual to address this issue- it was titled NIST SP 800-171. However, implementing NIST SP 800-171 has proved difficult as fulfilling its requirement can be costly and almost unattainable for contractors with low cyber literacy. This year the Cybersecurity Maturity Model Certification (CMMC) was released to revamp the existing requirements for DoD contractors and help address the complications associated with NIST SP 800-171.

Read More