Blog

EXOSTAR BLOG

Read what Exostar technology experts are saying about the latest in identity, collaboration, risk, and supply chain.

CMMC V1: What it means for NIST 800-171 & the defense industrial base

The Department of Defense (DoD) released Version 1 (V1) of the Cybersecurity Maturity Model Certification (CMMC) on January 31, 2020. The...

Read More

What Does PKI Mean to Life Sciences?

What is PKI?

Public Key Infrastructures (PKI) work to enable protection.  A PKI is simply a system that facilitates the distribution and...

Read More

cybersecurity, Life Sciences

March 31, 2016

Thwarting Intellectual Property Theft in Life Sciences

The Issue

It’s happening everywhere. All the time. You just don’t see it. A thief, stealing your corporate secrets and selling them for...

Read More

cybersecurity

January 12, 2016

Could your healthcare insurer be putting your organization at risk?

Cyber-based attacks pose a serious risk to organizations. Historically, business decisions were measured in dollars and cents. Now, they...

Read More

EPCS, cybersecurity

January 11, 2016

Healthcare: Are you posed to be the next big data breach victim in 2016?

Electronic medical records. E-prescribing. Online collaboration amongst patients, providers, and payers. These advances mean protecting...

Read More

Best Practices in Cyber Supply Chain Risk Management (SCRM)

I recently attended a National Institute of Standards and Technology (NIST) meeting on Best Practices in Cyber Supply Chain Risk Management...

Read More

EPCS, cybersecurity

October 27, 2015

Two Factor Authentication

what is two factor authentication and why is it important?

When exploring cyber security or internal system security, perhaps you’ve come...

Read More
No More Posts