Cybersecurity Legislative Activity: Summer 2023

August 7, 2023

The Summer of 2023 has been a busy stretch regarding cybersecurity legislative activity. Here’s a recap of some of the…

Read More
FedRAMP Rev. 5 servers

FedRAMP Rev. 5 Released

June 21, 2023

The Federal Risk and Authorization Management Program (FedRAMP) helps government agencies protect federal information while utilizing the power of cloud…

Read More

An Early Look at CMMC 2.0

May 23, 2023

Update: This article has been updated to reflect the publishing of the CMMC Final Rule (CMMC 2.0). The Cybersecurity Maturity…

Read More

Conducting a GLBA Risk Assessment

May 1, 2023

Under the latest version of the Gramm-Leach-Bliley Act (GBLA) Safeguards Rule, element two is the requirement to conduct a risk…

Read More
GLBA cybersecurity requirements

GLBA Cybersecurity Requirements: What Your Organization Needs to Do

April 25, 2023

On June 9, 2023, new Gramm-Leach-Bliley Act (GLBA) cybersecurity requirements that reflect updates to the Safeguards Rule component of the…

Read More

Protecting Your Data When it’s in the Hands of a Third-party

February 6, 2023

Auto-maker Nissan sent out a breach notification letter to approximately 18,000 people, notifying them that personal information had been leaked…

Read More

Ohio Supreme Court Rules Insurance Provider Not Required to Cover Cyber-attack Costs

January 12, 2023

The seven justices of the Ohio Supreme Court unanimously ruled that an insurance company was not required to cover the…

Read More

Implementing Phishing-resistant MFA

November 30, 2022

Phishing attacks continue to make news around the country. Businesses of all sizes have fallen prey, suffering damaged reputations and…

Read More

Lessons from the Uber CISO Conviction

November 2, 2022

The guilty verdict handed down to former Uber Chief Information Security Officer Joseph Sullivan has made waves in the cybersecurity…

Read More

The Benefits of a Virtual CISO

October 11, 2022

Most organizations recognize the importance of cybersecurity and have implemented some form of protection. Despite this, cyber-attacks are still happening,…

Read More

Finding a credible expert with the appropriate background, expertise, and credentials can be difficult. CompliancePoint is here to help.