Blog
Stay ahead of the curve with cutting-edge articles from our research team on a diverse range of topics exploring the ever-changing world of governance, risk, and compliance.
Spotlight
-
Article GLBA Higher Education NIST 800-171
GLBA Compliance in Higher Education: 2023 Complete Guide
Discover the importance of GLBA compliance in higher education, the role of Privacy and Safeguards…
-
Article GLBA Regulations
Understanding the GLBA Safeguards Rule, 2023 Complete Guide
The GLBA Safeguards Rule is a US law that requires financial institutions to implement specific…
-
Article Higher Education IT & Cybersecurity Risk Management
How to Build a Risk-Based Infosec Program in Higher Education, Complete Guide
Discover the key steps to building a risk-based infosec risk management program in higher ed for…
-
Article CMMC NIST 800-171 Regulations
Everything about the CMMC: Complete CMMC Guide, 2023 Edition
All you need to know about the CMMC, its framework, compliance requirements, and practical tips for…
-
Article HIPAA Regulations
Understanding the HIPAA Security Rule: Complete Guide
Learn the essentials of the HIPAA Security Rule, how to safeguard sensitive health information, and…
-
Article GLBA Regulations
GLBA Safeguards Rule: Conducting a Risk Assessment
Explore our guide on conducting a risk assessment under the GLBA Safeguards Rule to protect customer…
-
Article GLBA Higher Education NIST 800-171
GLBA Compliance in Higher Education: 2023 Complete Guide
Discover the importance of GLBA compliance in higher education, the role of Privacy and Safeguards…
-
Article GLBA Regulations
Understanding the GLBA Safeguards Rule, 2023 Complete Guide
The GLBA Safeguards Rule is a US law that requires financial institutions to implement specific…
-
Article Higher Education IT & Cybersecurity Risk Management
How to Build a Risk-Based Infosec Program in Higher Education, Complete Guide
Discover the key steps to building a risk-based infosec risk management program in higher ed for…
-
Article CMMC Regulations
Preparing for the CMMC: 5 Step Quick Guide
Getting CMMC certified takes time and preparation. This guide covers the five practical steps to go…
-
Article CMMC NIST 800-171 Regulations
Conducting a NIST 800-171 Basic Assessment: Complete Guide
Everything you need to know about the NIST 800-171 Basic Assessment and the steps you can take to…
-
Article CMMC NIST 800-171 Regulations
Scoping FCI & CUI for NIST 800-171 & CMMC: Complete Guide
Scoping FCI & CUI is a necessary step to make NIST 800-171 & CMMC compliance more feasible and…
-
Article Conferences Higher Education
EDUCAUSE CPPC 2022: Highlights
SaltyCloud attended the 2022 EDUCAUSE Cybersecurity and Privacy Professionals Conference (CPPC and…
-
Article Regulations TX-RAMP
Everything about TX-RAMP: Complete Guide
TX-RAMP is a new vendor risk management regulation for Texas state agencies and public higher…
-
Article CMMC Regulations
CMMC 2.0 is Here: 6 Key Updates
The Department of Defense has released CMMC 2.0, introducing several new updates. Here are the six…
-
Article HECVAT Higher Education Vendor Risk Management
Establishing a VRM Program with the HECVAT: Complete Guide
Learn how to establish a successful vendor risk management (VRM) program at a higher education…
-
Article Higher Education Regulations
Understanding the Campus Cybersecurity Program by the Department of Education
A closer look at the Department of Education's Federal Student Aid Office's (FSA) Campus…
-
Article CMMC Higher Education
CMMC in Higher Education: Complete Guide
Discover how the DFARS Interim Rule affects Higher Education Institutions that conduct DoD-sponsored…
-
Article IT & Cybersecurity Risk Management
The Top 5 Problems Security Teams Face During Cybersecurity Risk Assessments
A security risk assessment is a daunting task for any security team. This article will uncover the…
-
Article IT & Cybersecurity Risk Management
Conducting IT Risk Assessments Quick Guide
IT Risk Assessments are a critical component of any mature security program. Learn how to conduct…
-
Article Higher Education Regulations
Higher Education Regulations Quick Guide
With the applicable regulatory frameworks, anyone can shore up their compliance through the use of…
-
Article NYDFS Regulations
NYDFS: Achieving the New Risk Assessment Requirement
Performing a risk assessment and protecting sensitive consumer information under the NYDFS…
-
Article IT & Cybersecurity Risk Management
IT Risk Assessments: Prioritizing Risks
As you start to focus on the issues discovered during a cybersecurity risk assessment, figuring out…
-
Article IT & Cybersecurity Risk Management
IT Risk Assessments: Spreadsheets vs. Workflow Software
Using spreadsheets to conduct a risk assessment can be a powerful tool, but they have their…
-
Article IT & Cybersecurity Risk Management
In-House vs. Outsourced IT Risk Assessments
In-house and outsourced IT risk assessments both have their advantages and disadvantages. Depending…
-
Article IT & Cybersecurity Risk Management
How to Get Budget for an IT Risk Assessment
Justifying even a modest, incremental budget for a security program can be challenging. A few…
Say hello to powerfully simple GRC
The easier solution for mitigating risk, improving compliance, and building resilience