article thumbnail

China to probe Micron over cybersecurity, in chip war’s latest battle

IT World

The Chinese government is instituting a cybersecurity review of US-based memory chip maker Micron’s products being sold in the country, in the latest move in the ongoing semiconductor trade dispute that pits China against the US and its allies.

article thumbnail

How to Get Cybersecurity Maturity Model Certification (CMMC) Certified

Scytale

You know things are getting serious when the Department of Defense (DoD) gets involved, and that’s exactly the case with getting Cybersecurity Maturity Model Certification (CMMC) certified. Understanding CMMC The Cybersecurity Maturity Model Certification (CMMC) , a framework created by the U.S. Overall, CMMC 2.0

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How to Get Cybersecurity Maturity Model Certification (CMMC) Certified

Scytale

You know things are getting serious when the Department of Defense (DoD) gets involved, and that’s exactly the case with getting Cybersecurity Maturity Model Certification (CMMC) certified. Understanding CMMC The Cybersecurity Maturity Model Certification (CMMC) , a framework created by the U.S. Overall, CMMC 2.0

article thumbnail

Understanding the Levels of CMMC: Enhancing Cybersecurity Maturity

Scytale

Navigating cybersecurity is rarely a walk in the park, especially when the ‘park’ is highly-regulated, well-guarded, and developed by the US Department of Defense. This is particularly crucial regarding the Cybersecurity Maturity Model Certification (CMMC). But what does that mean for your business? Who is Subject to CMMC Compliance?

article thumbnail

How to Know When It’s Time to Hire a CISO with Adversarial Risk Management Founder Jerry Perullo and SafeBase Director of Strategy and Operations Macy Mody (Video)

SaaStr

As the world becomes increasingly digital, cybersecurity becomes increasingly critical. The first big investment in cybersecurity you should make is hiring a CISO. The primary reason to hire one is that you care about cybersecurity. Where to Begin: Cybersecurity & Privacy Governance (CyberGov).

article thumbnail

Generative AI Governance: Essential Tips to Get Started

Scytale

However, AI’s arrival (and implementation) has certainly caused a fair amount of whiplash, as some companies still try to wrap their heads around use, risks, and overall ethical governance. Hence, there is a growing need for and importance of Generative AI governance. What is Generative AI Governance?

article thumbnail

Thanks to A-Lign, Deel, Exclaimer, Notion VC, and Vanta for Sponsoring SaaStr Europa 2023!

SaaStr

A-LIGN is a technology-enabled security and compliance partner that helps global organizations take a strategic approach to confidently mitigate cybersecurity risks. Headquartered just outside of London and with regional offices in the U.S.