top of page

The Socium Blog
Feb 123 min read
Are Macs an Increased Cyber Attack Target?
MacOS Under Attack: How Threat Actors Are Targeting Apple Devices For years, macOS was considered a relatively secure operating system,...
13
Oct 31, 20242 min read
CMMC v2.0
With this final rule, posted on 10/15/2024, the DoD establishes the Cybersecurity Maturity Model Certification (CMMC) Program in order to...
2
Oct 25, 20241 min read
NIST Cybersecurity Framework (CSF 2.0)
NIST Cybersecurity Framework (CSF 2.0) The NIST (National Institute of Standards and Technology) Cybersecurity Framework (CSF) was...
8
Sep 8, 20243 min read
NIST 800-218 SSDF
NIST 800-218 SSDF NIST 800-218, also known as the Secure Software Development Framework (SSDF) , provides guidelines and best practices...
3
Sep 7, 20243 min read
The Fundamentals of Football and Cybersecurity: A Playbook for Success
In the world of football, victory is achieved through meticulous planning, discipline, and teamwork. The same principles apply to...
2
May 8, 20241 min read
SOC2 Certification
Service Organization Control (SOC) is a trust-based cybersecurity framework and auditing standard designed by the American Institute of...
2
Nov 8, 20231 min read
Health Insurance Portability and Accountability Act (HIPAA)
The Health Insurance Portability and Accountability Act (HIPAA) of 1996 was designed for healthcare organizations to safeguard the...
1
Aug 10, 20232 min read
California Privacy Rights Act (CPRA)
CPRA The California Privacy Rights Act (CPRA) is a ballot measure approved by voters in November 2020. Who is a ‘consumer’? A consumer is...
1
bottom of page