What Are Tenable and Assured Compliance Assessment Solutions?

ACAS tenable vulnerability scanning featured

Government agencies and contractors in the supply chain face threats every single day. If you haven’t read the news lately, our national infrastructure and data systems face significant challenges in maintaining the security and integrity of their devices, applications and network resources. When agencies and contractors want to connect to any sensitive system, the Department of Defense requires that they utilize the Assured Compliance Assessment Solution (ACAS).

This suite of vulnerability scanning software provides passive and active search capabilities that promote high levels of network security and compliance while standardizing these tools for organizations no matter where they are at. 

Read More

Penetration Testing and CMMC Compliance

cmmc penetration testing featured

Penetration testing is an increasingly common security practice for many businesses using sophisticated IT or cloud systems. Under CMMC, penetration testing is even more important because achieving higher levels of responsibility and capabilities calls for some form of penetration testing. 

Here we’re discussing how penetration testing plays into CMMC regulations and when you can begin to expect it as a requirement. 

Read More

What Are the 4 Types of Penetration Testing?

types of penetration testing featured

In previous articles, we’ve discussed the basics of penetration testing and more advanced automated pen testing. The truth is that modern penetration testing has evolved along several different trajectories, all impacted by the unique demands of data-driven business. 

Here, we’ll cover the different, broad categories of penetration testing, and what they are intended to protect your systems from. Following this, you should be able to recognize, regardless of your compliance requirements, what penetration tests you would need to assess your comprehensive security posture. 

 

Read More