top of page

The Socium Blog


6 Months of CMMC Lessons: Why CMMC Level 2 Takes 9–12 Months, Not 90 Days.
Organizations pursuing Cybersecurity Maturity Model Certification (CMMC) 2.0 Level 2 compliance have been encountering several recurring...
Jul 74 min read


TRENDS IN ROBOTICS CYBERSECURITY
What Product Owners Need to Know About Robotics and Cybersecurity As robotics systems move from prototypes to production, product owners...
May 213 min read
Understanding NIST 800-218 SSDF: A Strategic Guide for Secure Software Development
What is NIST 800-218 SSDF — And Why Should Your Business Care? In today’s environment of escalating supply chain attacks, vulnerable...
Apr 292 min read
Artificial Intelligence: Focus through the Windshield versus the Rearview Mirror
How Executives and Risk Managers Can Lead Secure AI Adoption for the Future of Their Business Artificial Intelligence is no longer a...
Apr 293 min read
Cybersecurity: A Value Creation Lever in the Private Equity Lifecycle
Cyber Threats Are Business Risks, Not Just IT Problems The digital landscape has changed. Ransomware, phishing, insider threats, and...
Apr 292 min read
Are Macs an Increased Cyber Attack Target?
MacOS Under Attack: How Threat Actors Are Targeting Apple Devices For years, macOS was considered a relatively secure operating system,...
Feb 123 min read
CMMC v2.0
With this final rule, posted on 10/15/2024, the DoD establishes the Cybersecurity Maturity Model Certification (CMMC) Program in order to...
Oct 30, 20242 min read
NIST Cybersecurity Framework (CSF 2.0)
NIST Cybersecurity Framework (CSF 2.0) The NIST (National Institute of Standards and Technology) Cybersecurity Framework (CSF) was...
Oct 25, 20241 min read
NIST 800-218 SSDF
NIST 800-218 SSDF NIST 800-218, also known as the Secure Software Development Framework (SSDF) , provides guidelines and best practices...
Sep 7, 20243 min read
The Fundamentals of Football and Cybersecurity: A Playbook for Success
In the world of football, victory is achieved through meticulous planning, discipline, and teamwork. The same principles apply to...
Sep 7, 20243 min read
SOC2 Certification
Service Organization Control (SOC) is a trust-based cybersecurity framework and auditing standard designed by the American Institute of...
May 7, 20241 min read
Health Insurance Portability and Accountability Act (HIPAA)
The Health Insurance Portability and Accountability Act (HIPAA) of 1996 was designed for healthcare organizations to safeguard the...
Nov 8, 20231 min read
California Privacy Rights Act (CPRA)
CPRA The California Privacy Rights Act (CPRA) is a ballot measure approved by voters in November 2020. Who is a ‘consumer’? A consumer is...
Aug 9, 20232 min read
General Data Protection Regulation (GDPR)
GDPR The General Data Protection Regulation (GDPR) was passed by European Parliament in 2016 to establish data privacy and security...
Apr 19, 20233 min read
Updated Regulation for PCI DSSv4.0
What is PCI DSS? The PCI Security Standards Council (PCI SSC) serves as a worldwide platform where stakeholders in the payments industry...
Jan 10, 20232 min read
bottom of page