Cocoon Data Blog

September 22, 2020

Cocoon Data and eFortresses Collaboration CMMC Announcement

Cocoon Data and eFortresses are pleased to announce their strategic partnership, designed to help organizations in the US Dept of Defense supply chain who will be impacted by the introduction of the Cybersecurity Maturity Model Certification (CMMC) later this year.

September 18, 2020

What Defense Contractors Need to Know About the US Government’s CMMC Requirements

Just like any other organization, the cybersecurity of the US Department Of Defense (DOD) is only as strong as its weakest link – currently, many of the contractors and subcontractors providing the products and services to the US DoD are not subject to its strict cybersecurity requirements.

Centralised Employee Data
September 1, 2020

Ensuring Human Resources Data Privacy and Compliance

As a Human Resources (HR) professional you are involved in the most private aspects of your fellow employees’ work lives. You’re an expert in compensation and benefits, managing numerous uncomfortable topics, such as substance abuse, workplace hostility and unethical behaviour.

Canberra Parliament House
August 25, 2020

The Hon. Christopher Pyne Hosts Cybersecurity Event

Following several large-scale cyber attacks on Australian Governments and Businesses, Cocoon Data hosted an event with the former Defence Minister, the Hon Christopher Pyne, and Cocoon Data’s Chairman and CEO, Trent Telford.

Digital World Map
August 18, 2020

Australia’s Largest Ever Investment in Cyber Security

The Federal Government will make the nation’s largest ever investment in cyber security, with $1.35 billion over the next decade to enhance the cyber security capabilities and assistance provided to Australians through the Australian Signals Directorate and the Australian Cyber Security Centre.

June 15, 2020

New SafeShare features available in AWS US GovCloud

Government agencies and U.S. companies are turning to the flexible, scalable and cost-effective option of cloud computing.

May 28, 2020

How SafeShare uses visual fingerprinting to discourage collaborators from copying file views

Just like facial recognition and voice identification, human fingerprints are biometric identifiers, physical characteristics considered to be unique to each individual.

April 30, 2020

Ensuring compliance and protecting your data sovereignty during COVID-19

The laws around social distancing during the COVID19 pandemic have dramatically changed the way we all live and work, relocating most employees from a traditional office environment to working from home.

March 20, 2020

Working from home with sensitive data

Working remotely is a challenge for all the workforce, but when you are the CEO or the CISO, CSO or Compliance Officer presents unique challenges because protecting that sensitive date is a direct part of your job

Military Aircraft in desert
December 2, 2019

ITAR Cloud Compliance

Cloud solutions for compliance and regulated data take a monumental burden off of businesses. Compliance directives such as ITAR and EAR apply to your business regardless of your resources or ability to become compliant.

Get great articles direct to your inbox

We’ll never share your details. See our Privacy Policy
We’ll never share your details with third parties.
View our Privacy Policy for more info.