"With a number of cloud-based file sharing and data storage companies entering into the market, compliance, security, and governance of sensitive data has become a burning issue. If that was not enough, the recent pandemic has opened a new warfront for global organizations. A recent McAfee study reported that the use of cloud-based collaboration tools has gone up by 600 percent. But the work-from-home model has triggered a staggering 630 percent increase in external attacks on cloud users."
How eFortresses leveraged SafeShare to streamline CMMC training and implementation processes safely and securely for HISPI and eFortresses CMMCSCORECARD service. Taiye Lambo, the founder of eFortresses and the non-profit Holistic Information Security Practitioner Institute (HISPI) is a cybersecurity leader, socially-engaged entrepreneur and virtual CISO with over 30 years of information technology experience across 4 continents.
“Macquarie Telecom has been accused of copying the product of a former software partner and misleading government agencies about product upgrades that could have left them vulnerable to cyber security problems. In a statement of claim to the Supreme Court of NSW, seen by The Australian Financial Review, Cocoon Data accuses Macquarie’s Government division of failing to honour the terms of an agreement for it to resell Cocoon’s Safe Share security platform, and eventually creating its own copycat version, which it passed off as an incremental upgrade.” – Paul Smith | AFR Technology Editor
Cocoon Data and eFortresses are pleased to announce their strategic partnership, designed to help organizations in the US Dept of Defense supply chain who will be impacted by the introduction of the Cybersecurity Maturity Model Certification (CMMC) later this year.
Just like any other organization, the cybersecurity of the US Department Of Defense (DOD) is only as strong as its weakest link – currently, many of the contractors and subcontractors providing the products and services to the US DoD are not subject to its strict cybersecurity requirements.
As a Human Resources (HR) professional you are involved in the most private aspects of your fellow employees’ work lives. You’re an expert in compensation and benefits, managing numerous uncomfortable topics, such as substance abuse, workplace hostility and unethical behaviour.
Following several large-scale cyber attacks on Australian Governments and Businesses, Cocoon Data hosted an event with the former Defence Minister, the Hon Christopher Pyne, and Cocoon Data’s Chairman and CEO, Trent Telford.
The Federal Government will make the nation’s largest ever investment in cyber security, with $1.35 billion over the next decade to enhance the cyber security capabilities and assistance provided to Australians through the Australian Signals Directorate and the Australian Cyber Security Centre.
Government agencies and U.S. companies are turning to the flexible, scalable and cost-effective option of cloud computing.
Just like facial recognition and voice identification, human fingerprints are biometric identifiers, physical characteristics considered to be unique to each individual.