Latest Posts › NIST

Share:

CMMC 2.0: Level One: A Self-Assessment

As we promised a trilogy in our earlier 2024 CMMC Blog – “Get Ahead of Compliance: The Proposed Rule for the Cybersecurity Maturity Model Certification (CMMC 2.0) Is Out!” – we continue our series with a discussion of each...more

Get Ahead Of Compliance: The Proposed Rule For The Cybersecurity Maturity Model Certification (CMMC 2.0) Is Out!

As a lawyer working in a firm with a sophisticated legal team providing robust regulatory, government contract, and cybersecurity services, our Christmas present and holiday reading arrived early with the publication of the...more

Risky Business And Cyber Attacks… Simple Steps To Limit Liability Of Cybersecurity Service Providers

The consequences of a cyber attack can be significant and wide-ranging for both an individual and a business – no matter how big or small. Cyber attacks can result in serious data breaches that lead to the theft or exposure...more

The Rise Of Biometric Data Collection And Privacy Practices In Government Contracts And Beyond

Biometric data refers to an individual’s physical attributes such as fingerprints, facial recognition, or Iris scans for the purpose of identification. This type of data is currently being used by many government agencies for...more

4 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide