Understanding the Four CMMC Phases
The start of 2025 brought with it another milestone in the implementation of the CMMC program: official C3PAO authorization. While the program officially commenced on December 16th, in a notice to the ecosystem, the Cyber AB stated that January 2n...
Show Filters
Understanding the Four CMMC Phases
The start of 2025 brought with it another milestone in the implementation of the CMMC program: of...
Social Engineering and Red Teaming
“Red teaming” is a term borrowed from military war games and adapted to the business environm...
CMMC Final Rule: Time to Comply
The Cybersecurity Maturity Model Certification (CMMC) Final Rule has been released, bringing sign...
Identity Threat Protection with OKTA
Identity Threat Protection with Okta AI hardens your resilience against today’s toughest attacks.
Worried About HIPAA Revisions? Here’s where SOC, PCI, and ISO may have you covered
While HIPAA will celebrate its 30th birthday next year, the healthcare rule for data privacy made...
Read More about Worried About HIPAA Revisions? Here’s where SOC, PCI, and ISO may have you covered
NIST SP 800-171 Revision 3 Finalized: A Whisper in the Roar of CMMC
Although overshadowed by the larger, admittedly more consequential swings in the world of CMMC, N...
Read More about NIST SP 800-171 Revision 3 Finalized: A Whisper in the Roar of CMMC
Board-Level Cybersecurity: Measuring and Communicating Risk to your Board
Join cybersecurity experts Anir Desai, Justin Graham, and Ashli Pfeiffer, along with Bryan Mitche...
Read More about Board-Level Cybersecurity: Measuring and Communicating Risk to your Board
As Generative AI (GenAI) becomes cheaper and more prevalent, more companies are seizing the oppor...
Proposed Changes to HIPAA Rules: What You Need to Know
In January 2025, the Department of Health and Human Services (HHS) has proposed significant updat...
Read More about Proposed Changes to HIPAA Rules: What You Need to Know
Proactive Identity Security: Trends for 2025
With Identity threats on the rise, it’s more important than ever to reduce your company’s Ide...
Read More about Proactive Identity Security: Trends for 2025
CMMC Program Go Live – What You Need to Know
December 16th, 2024 marks the official launch of the Cybersecurity Maturity Model Certification (...
Read More about CMMC Program Go Live – What You Need to Know
Preparing for PCI DSS v4.0 Future-Dated Requirements
The Payment Card Industry Data Security Standard (PCI DSS) v4.0 is designed to adapt to the evolv...
Read More about Preparing for PCI DSS v4.0 Future-Dated Requirements
To Unify or Not to Unify? When to Streamline Multiple Compliance Frameworks
Join compliance experts Jeremiah Sahlberg and Ashli Pfeiffer as they tackle one of the most press...
Read More about To Unify or Not to Unify? When to Streamline Multiple Compliance Frameworks
Why Climate Change Should Be Considered for Companies Pursuing ISO 27001?
In today’s rapidly evolving business landscape, companies increasingly recognize the importance...
Read More about Why Climate Change Should Be Considered for Companies Pursuing ISO 27001?
2025 CISO Cybersecurity Trends Report
Tevora’s 2025 CISO Cybersecurity Trends Report is a compilation of the insights and trends that...
The Scary Side of Cybersecurity: Why On-Premise Penetration Testing is Key
Join our cyber threat team as they explore the evolving landscape of on-premise penetration testi...
Read More about The Scary Side of Cybersecurity: Why On-Premise Penetration Testing is Key