top of page

The Socium Blog


6 Months of CMMC Lessons: Why CMMC Level 2 Takes 9–12 Months, Not 90 Days.
Organizations pursuing Cybersecurity Maturity Model Certification (CMMC) 2.0 Level 2 compliance have been encountering several recurring...
4 days ago4 min read
Â
Â


TRENDS IN ROBOTICS CYBERSECURITY
What Product Owners Need to Know About Robotics and Cybersecurity As robotics systems move from prototypes to production, product owners...
May 213 min read
Â
Â
Understanding NIST 800-218 SSDF: A Strategic Guide for Secure Software Development
What is NIST 800-218 SSDF — And Why Should Your Business Care? In today’s environment of escalating supply chain attacks, vulnerable...
Apr 302 min read
Â
Â
Artificial Intelligence: Focus through the Windshield versus the Rearview Mirror
How Executives and Risk Managers Can Lead Secure AI Adoption for the Future of Their Business Artificial Intelligence is no longer a...
Apr 293 min read
Â
Â
Cybersecurity: A Value Creation Lever in the Private Equity Lifecycle
Cyber Threats Are Business Risks, Not Just IT Problems The digital landscape has changed. Ransomware, phishing, insider threats, and...
Apr 292 min read
Â
Â
Are Macs an Increased Cyber Attack Target?
MacOS Under Attack: How Threat Actors Are Targeting Apple Devices For years, macOS was considered a relatively secure operating system,...
Feb 123 min read
Â
Â
CMMC v2.0
With this final rule, posted on 10/15/2024, the DoD establishes the Cybersecurity Maturity Model Certification (CMMC) Program in order to...
Oct 31, 20242 min read
Â
Â
NIST Cybersecurity Framework (CSF 2.0)
NIST Cybersecurity Framework (CSF 2.0) The NIST (National Institute of Standards and Technology) Cybersecurity Framework (CSF) was...
Oct 25, 20241 min read
Â
Â
NIST 800-218 SSDF
NIST 800-218 SSDF NIST 800-218, also known as the Secure Software Development Framework (SSDF) , provides guidelines and best practices...
Sep 8, 20243 min read
Â
Â
The Fundamentals of Football and Cybersecurity: A Playbook for Success
In the world of football, victory is achieved through meticulous planning, discipline, and teamwork. The same principles apply to...
Sep 7, 20243 min read
Â
Â
SOC2 Certification
Service Organization Control (SOC) is a trust-based cybersecurity framework and auditing standard designed by the American Institute of...
May 8, 20241 min read
Â
Â
Health Insurance Portability and Accountability Act (HIPAA)
The Health Insurance Portability and Accountability Act (HIPAA) of 1996 was designed for healthcare organizations to safeguard the...
Nov 8, 20231 min read
Â
Â
California Privacy Rights Act (CPRA)
CPRA The California Privacy Rights Act (CPRA) is a ballot measure approved by voters in November 2020. Who is a ‘consumer’? A consumer is...
Aug 10, 20232 min read
Â
Â
General Data Protection Regulation (GDPR)
GDPR The General Data Protection Regulation (GDPR) was passed by European Parliament in 2016 to establish data privacy and security...
Apr 20, 20233 min read
Â
Â
Updated Regulation for PCI DSSv4.0
What is PCI DSS? The PCI Security Standards Council (PCI SSC) serves as a worldwide platform where stakeholders in the payments industry...
Jan 10, 20232 min read
Â
Â
bottom of page