SteelToad OP

Cyber Security
CMMC Compliance for the Defense Industrial Base (DIB)

What Is The CMMC Ecosystem? The collaborative collection of people, governing bodies, and organizations involved with CMMC is known as the CMMC Ecosystem. What is the DIB (Defense Industrial Base)? The DIB is made up

Read More
Cyber Security
10 Reasons an Organization Should Have CMMC Certification

What Is CMMC? The CMMC Model was developed in part because of DOD’s need for assurance that the DIB is wholly conforming and adhering to the cybersecurity standards for CUI and FCI, outlined in NIST

Read More
Cyber Security
Cyber Security in Higher Education

Why is higher education more susceptible to cyber-attacks? Universities, historically, have been particularly prone to cyber-attacks. During a pandemic, with an increased reliance on remote learning, this issue has only been exacerbated. In fact, education

Read More
Cyber Security
Missing Profits – Music Artists Defense Against Cyber Attacks

Spotify is one of the world’s most successful and largest music streaming platforms. Established in 2006, since then, the service has grown to host over 82 million songs and podcasts, has 182 million paid subscription

Read More
Cyber Security
The Unseen War in Cyberspace – Navy Turns Towards Cyber Security Studies

On May 13th, 2022, Governor Larry Hogan signed over 100 new bills into order, the majority focusing on bolstering defenses against cybersecurity attacks that have been occurring in greater and grander succession. In 2019, hackers

Read More
Cyber Security
Security Incident Management

Contain and learn. Shoot for NEVER. EVER. Plan for whenever. SteelToad’s clients manage security incidents utilizing our strategies outlined below. Preparation Develop Incident response methodologies typically emphasize preparation—not only establishing an incident response capability so

Read More
Cyber Security
Facial Recognition Technology – A Slippery Slope

Facial Recognition Technology (FRT) is a $9.6 billion dollar industry (TechHQ, 2022) that was first developed in the 1960s as a computer program to detect human characteristics and features. Since it has been adopted by

Read More
Cyber Security
From the Physical to the Digital – The Enormous Smithsonian Archives Migration

The Smithsonian Institution is known for having one of the largest and most comprehensive physical archives in the country. Varying from American history to scientific research to cultural exhibits, the Smithsonian has millions of records

Read More
Cyber Security
Good News for CMMI Organizations Seeking to Adopt CMMC

Maturity Models like the Capability Maturity Model Integration (CMMI) and the Cybersecurity Model Maturity Certification (CMMC) are used to understand the current maturity level of an enterprise or Organization Unit (OU) and guide the enterprise

Read More