HOME       BLOG      CONTACT

 

Summit 7 Blogs

The Evolution to Zero Trust and CMMC Implications

By Cam Evans July 30, 2021

Trust no one. When it comes to implementing cybersecurity today, that’s the resounding..

Takeaways from Special Senate Hearing on CMMC and DIB Cybersecurity

By Shawn Hays June 10, 2021

It was encouraging to see the Cybersecurity Maturity Model Certification (CMMC) and its goals on..

Microsoft Defender in Office 365 GCC and GCC High

By Jay Jones December 15, 2020

Recently, Microsoft consolidated several of its security products into the Microsoft Defender..

CMMC Incident Response (IR) with Azure Sentinel

By Shawn Hays April 9, 2020

Often the purposes or differences between a Cloud Access Security Broker (CASB) like Microsoft's..

Tackling CMMC and More with Microsoft Cloud App Security (MCAS)

By Shawn Hays March 4, 2020

Often the purposes or differences between a Cloud Access Security Broker (CASB) like Microsoft's..

Controlled Unclassified Information: What is CUI and it's Origins

By Scott Edwards January 6, 2020

The CUI Dilemma

Companies supporting the defense industry are scrambling to understand how to..

Cybersecurity Maturity Model Certification (CMMC) 0.7 Released

By Shawn Hays December 18, 2019

Major cuts were made to CMMC Levels 4 and 5, but slight adjustments were made across the board...

Restrict Documents in Real Time on Mac Office Products - Azure Information Protection

By Shawn Hays September 10, 2018

It has historically been difficult to enable users to easily and seamlessly restrict a document..

CS2-San-Diego-Registration