5 Ways to Strengthen Your Cybersecurity
In today’s world, it’s not enough to have just the basics in place to protect your business against cybercriminals. Too many companies — even the most sophisticated ones — make egregious simple and avoid errors that make them far too vulnerable to hackers, malware, and ransomware. If you’re looking for some simple ways to beef-up […]
Webinar – CMMC 2.0 – Major Changes
Here the latest updates and changes with the new CMMC 2.0 draft. Matt Titcombe and Gigit review the changes and things that all DIB contractors need to watch out for. See the Webinar here.
Gigit CISO to Present CMMC-Centric Topics at Two February Virtual Events
Surging interest by DoD contractors and other government contractors makes CMMC the latest hot topic Boulder, CO (February 4, 2021) – – Gigit, Inc. (https://gigitsecurity.com), a cybersecurity firm that ensures cybersecurity compliance and reduces cybersecurity risk through its testing, assessment, and consulting services, today announced the appearance of its new Chief Information Security Officer, Matthew Titcombe, […]
M&A Dealmaking and Cybersecurity’s Impact!
Matt Titcombe talks about M&A deals and the role CISOs and other senior executives will play. View Here
Business Development Powerhouse Jebb Lewis Joins Gigit
Boulder, CO (July 1, 2021) – Gigit, Inc. (https://gigitsecurity.com/), a consulting firm that reduces cybersecurity risk and vulnerability through its service products like pentesting, cyberthreat gap analysis, and compliance solutions services, today announced the hiring of seasoned business development professional and entrepreneur Jebb Lewis. Lewis, who has extensive experience building and leading sales programs within organizations, […]
THE LOG4J EXPLOIT, ARE YOU VULNERABLE?
A major security flaw in the Java logging package of log4j has been discovered. The Log4j vulnerability is an extremely easy exploit; attackers are scanning the internet for vulnerable systems, using Log4j to install Coin Miners and remote access tools like Cobalt Strike to enable credential theft, which can be used to steal data. If […]
The Impact of CMMC: Should You Sell Your DoD Business?
For owners of businesses that work with the Department of Defense (DOD), you know compliance is an important factor in your success. But, have you started investing in CMMC compliance? If not, you risk missing out on future DOD contracts and the ultimate health of your business. CMMC Compliance The Cybersecurity Maturity Model Certification (CMMC) was introduced […]
CMMC: The Next Frontier In Cybersecurity
The US Federal Government declared that all Suppliers to the US Department of Defense (Prime or Subcontractors) must comply with the Cybersecurity Maturity Model Certification (CMMC) requirements. Suppliers that act early will benefit from preferential treatment. To set your business up for long-term success, DoD Suppliers should start investing in CMMC now. The benefits of being an […]
4 Signs It’s Time To Hire A Virtual CISO
Cybersecurity breaches are commonplace in the news, and defense suppliers and critical infrastructure operators are increasingly targets. As such, organizations of all sizes need to be proactive about protecting their data and systems. A Virtual Chief Information Security Officer (vCISO) can provide strategic guidance for your organization’s cybersecurity measures. What is a Virtual CISO? A […]
The Impact of CMMC: Should You Sell Your DoD Business?
For owners of businesses that work with the Department of Defense (DOD), you know compliance is an important factor in your success. But, have you started investing in CMMC compliance? If not, you risk missing out on future DOD contracts and the ultimate health of your business. CMMC Compliance The Cybersecurity Maturity Model Certification (CMMC) was introduced […]