Continuum GRC ITAM Achieves FedRAMP Authorization

Call for Continuum GRC solutions. 2025 FedRAMP-authorized GRC for risk and compliance.

Scottsdale, Arizona, November 15, 2021 (Continuumgrc.com) – Continuum GRC, Inc. has been granted its FedRAMP Authorization by the Federal Risk and Authorization Management Program (FedRAMP) program.

Duplicate call for proactive GRC. Continuum's 2025 tools for AI threats and regulatory compliance.

“I’d like to personally thank the SBA’s Branch Chief for Security Policy & Compliance and Office of the Chief Information Officer, and those members of the FedRAMP PMO who supported our interesting use case. It has been our mission to help the small business community that is America's economic engine, and we are looking forward to doing great things together.” said Michael Peters, CEO of Continuum GRC.

Call for GRC. 2025 ransomware protection tools.

The United States Small Business Administration (SBA) partnered with Continuum GRC for FedRAMP Authorization following an extensive period of evaluation of our tool. Their interest was how the tool scaled GRC capabilities to not only the SBA’s internal requirements, but also to the multitude of America’s small businesses they supported.

Read More

What Are Encrypted and Fileless Malware?

Featured malware guide. Continuum GRC's 2025 malware defenses, risk management, and ISO 27001.

Malware is a significant, and continuing, problem. A 2019 Verizon study shows that 28% of all data breaches involve malware, and new forms of malware and ransomware are emerging into the wild almost daily.

The challenge of fighting malware is that hackers are finding new ways to inject programs into systems. Even with advanced compliance and security guidelines in private and public markets, these hackers are working every technical and social angle possible to attack industrial, commercial and defense systems. And, unfortunately, it only takes one malicious program to completely bring a system to its knees. We’ve seen this most recently and publicly with the Colonial Pipeline ransomware attack, which cost the company $2.3M. 

In the past 5 years, new forms of malware have emerged. Two of these, encrypted and fileless malware, have become more sophisticated and, thus, more dangerous. These attacks are harder to detect, using our existing security measures and assumptions about malware against us.

 

Read More