Home » Compliance

Compliance

Hacking the Heartland (Part 2): Farming Intellectual Property

Traditional American Farm With Blue Sky

Having your trade secrets hacked is never a good thing, but there are certain areas within the U.S. economy where a hacked trade secret could lead way to an absolute disaster. One of those industries that many people don’t typically associate with highly sophisticated technology: agriculture. Nonetheless, the ag industry is currently a top concern in international cyber defense. Cyber ...

Read More »

What the New Cyber Incident Policy Directive Means for Your Organization

capitol

What exactly is the difference between a run-of-the-mill cyber incident and a “significant” cyber incident? Your organization may or may not have had to ponder this question in the past, but the federal government certainly has — and it’s an important question to boot. The distinction among severity levels will weigh heavily in the government’s response to cyber threats, and ...

Read More »

Assessing the Usefulness of the NIST 800-53 Appendix J Privacy Controls

whitepapers02

Contractors to the federal government and information security professionals are no doubt familiar with NIST Special Publication 800-53. Provided by the National Institute of Standards and Technology (NIST), the 800-53 is a set of controls intended to protect federal information systems from “hostile cyber attacks, natural disasters, structural failures, and human error.” Since their inception, these controls have gone through ...

Read More »

5 Things You Need to Know About BYOD and Cyber Security

services04

Bring-your-own-device (BYOD) policies can be a boon for organizations that implement them. Employees can use the same device for both personal and business uses to work from anywhere, which can result in increased productivity. Tasks that employees once had to leave in limbo once they left the office can now be finished outside the workplace and completed without delay. By ...

Read More »