Meeting Continuous Threat Monitoring and Compliance Requirements with Amazon GuardDuty

Compliance focused organizations are required to not only monitor but also demonstrate and report on the nature of cybersecurity attacks they are facing.

stackArmor hosts NIST SP 800-171 and CUI event to comply with DFARS requirements

On 2nd February 2018, stackArmor was delighted to host a 2 hour information session on NIST SP 800-171 and Understanding CUI

Security and hardening best practices for hosting Sitecore on AWS  

AWS offers a broad selection of compliant services that meet various regulatory standards such as HIPAA, FedRAMP, FISMA, NIST SP 800-171 and PCI-DSS

Free Event: Understanding NIST SP 800-171 for Protecting Unclassified Information

DFARS Clause 252.204-7012 requires that contractors implement NIST SP 800-171 to protect systems and networks that process, store, or transmit.

Strategies for meeting DFARS and NIST SP 800-171 requirements with AWS GovCloud

DOD prime contractors and sub-contractors must demonstrate compliance with NIST SP 800-171 based on DFARS Clause 252.204-7012 starting Jan 01, 2018.

Meet DFARS and NIST 800-171 compliance deadlines with AWS GovCloud

DFARS Clause 252.204-7012, Safeguarding Covered Defense Information and Cyber Incident Reporting, requires organizations doing business

Can we prevent data leaks with continuous vulnerability monitoring and security compliance?

The ability to protect and safeguard data in the cloud is critical to meet mission requirements and deliver satisfactory business outcomes.

Delivering a FedRAMP or 800-171 compliant cloud solution on AWS

Contractors providing technical support services for DOD and US Federal Agencies are required to provide FedRAMP compliant cloud solutions

Secure Data As a Service with Data Lake on Amazon Web Services (AWS)

The AWS Datalake Pattern is ideally suited for organizations looking for a cost-effective, secure and customizable way

Are you suffering from VIVO (Vulnerability In, Vulnerability Out) in your AWS cloud environment?

Vulnerability management of digital assets begins with strong Security By Design principles that ensure that vulnerabilities are not introduced into the system