I'm excited to let everyone know that my book, the Compliance Formula, Successful Strategies of CMC Compliant Companies, had a very successful launch last Thursday and achieved Amazon number one best seller. I really...Read More
This week, we'll finish our brief overview of the cybersecurity frameworks. Five High level Functions. So far, we've briefly discussed the identify, protect, detect, and respond functions. The fifth high-level...Read More
Last week we briefly discussed the identity and protect functions of the cybersecurity framework. This week we'll continue going through the framework with a discussion about the detect and respond functions. Detect...Read More
As many of you know, unless I'm out of town, I sit here on the deck and share some cybersecurity tips, tricks and hints with you to provide some practical things that you can do to help keep yourself, your family and...Read More
Last week we went through a brief overview of the primary functions of the cybersecurity framework. This week we'll dive a bit deeper into the identify and protect functions. The activities and the identify function...Read More
Last week I introduced the National Institute of Standards and Technology Cybersecurity Framework, commonly referred to as the CSF and its primary functions. Identify, protect, detect, respond and recover. What are...Read More
Storing passwords and credit cards in your browser is a huge open door for hackers, so please don't do it ever. First issue is that anyone and it doesn't even have to be a cybercriminal who sleeps around your...Read More
Today, I'm going to have a slightly different focus and talk about compliance instead of cybersecurity. Specifically, I'll discuss my thoughts from attending a virtual Cybersecurity maturity Model certification town...Read More
Most of or maybe all of us have clicked on a phishing email at some point in our lives. Most of them were easy to spot only a few years ago. But even then, if you were in a hurry or distracted by something, you...Read More
Read the rest of his inspiring story on how TechSage Solutions became the business it is today.
The Compliance Formula simplifies complex compliance challenges, equipping businesses to achieve CMMC certification and protect against costly cyber threats. Written by top IT leaders, this book is essential for organizations seeking to win Department of Defense contracts, enhance security, and avoid the financial and legal risks of non-compliance.