Acronis SCS Offers Unique Industry Perspective at Inaugural DoDIN APL Summit Provides expertise on software supply chain security and insight on DoD’s CMMC SCOTTSDALE, AZ – Oct. 29, 2020 – Last week, Acronis SCS – an Arizona-based cyber protection and edge data security company serving
Spearheaded by the Office of Under Secretary of Defense for Acquisition & Sustainment, the Cybersecurity Maturation Model Certification (CMMC) maps out cyber hygiene requirements for all contractors within the defense industrial base. In contrast to past regulations that relied on contractor self-certification, the CMMC requires
From power grids and advanced weapons systems to the telework-enabling apps connecting us during COVID-19, software sits at the heart of nearly all that keeps America and the world running. As more and more products and services rely on the use of unvetted third party
Fill Your Calendar Wisely During COVID-19 In a world of seemingly endless video calls – and the “Zoom fatigue” that too often follows – determining which virtual events are worth attending can sometimes be an exhausting task in and of itself. That choice was simple,
On November 25, 2019, Acronis SCS CEO John Zanni spoke on Government Matters TV in response to the Federal Chief Information Security Officer’s top goals regarding supply chain cybersecurity. They were joined by Gary Shiffman, founder and CEO of Giant Oak and Adjunct Professor at
Why Go? Last weekend, a fellow colleague of mine at Acronis SCS and I had the opportunity to attend Arizona’s premier security conference, CactusCon, in neighboring Mesa. The annual event, which began in 2012 and is now the largest conference of its kind in the
Last month, I attended one of the stops on the Department of Defense’s (DoD) Cybersecurity Maturation Model Certification (CMMC) listening tour to gain a better understanding of future cyber hygiene expectations for the defense industrial base (DIB). The CMMC, which was first announced in June, is the Department’s fresh
During recent discussions with a number of IT decisionmakers across the higher education landscape, an interesting trend emerged. Many of these leaders and their IT teams choose to forego backups of mobile endpoints and edge devices, instead entrusting that responsibility to individual users and employees.