Resources

Learn more about Abacode! Here you can find more information about our services and read our latest news and blogs!

Featured
White Paper - CMMC Compliance and Managed Services
White Paper
CMMC Compliance and Managed Services

Discover how CMMC Compliance and Managed Services can safeguard your organization in the defense contract supply chain.

Learn More
Filter by:

Asset Type

Tags

  • Blog

  • RSA Conference 2024 Recap
    Blog

    RSA 2024 RECAP

    Abacode was in full force at the RSA Conference USA 2024, held on May 6-9 at the Moscone Center in San Francisco. The conference featured...

    May 15, 2024
  • Abacode header image
    Blog

    Integrating CMMC Training into Existing Employee Programs

    Enhance your cybersecurity readiness through integrated training programs offered by Abacode.

  • What is CMMC
    Blog

    What is Cybersecurity Maturity Model Certification (CMMC)?

    The Cybersecurity Maturity Model Certification (CMMC) program isn't just an option when seeking contract awards with the U.S. government – it's a necessity.

  • Abacode-Blog-CMMC-2.0-Introduction
    Blog

    CMMC 2.0 Update

    As covered in the CMMC-AB Townhall webinar, CMMC 2.0 is now required for all contractors and subcontractors of the DoD.

  • Roadmap to CMMC
    Blog

    The Roadmap to CMMC Compliance

    Understanding CMMC is no longer an option; it's a necessity for businesses vying for government contracts, particularly with the DoD.

  • abacode header image
    Blog

    The XZ Backdoor: Hijacking and subsequent planting of a backdoor

    Over Easter weekend, more facts came to light about the hijacking and subsequent planting of a backdoor in the open source XZ project.

    April 1, 2024
  • MCCP
    Blog

    ACG Endorsed Partner Provider for MCCP Core

    Abacode Cybersecurity & Compliance has created a strategic partnership with the Association for Corporate Growth (ACG). Through this partnership, Abacode is ACG...

  • HFS Research logo
    Blog

    Abacode targets firms’ ecosystem-wide cyber threat

    More than 60% of ransomware attacks originate in a company’s third-party partner.

    August 4, 2023
  • How Hackers Can Circumvent Multi-Factor Authentication
    Blog

    How Hackers Can Circumvent Multi-Factor Authentication

    While MFA significantly enhances security, no system is entirely immune to sophisticated hacking attempts.

    August 14, 2023
  • 1 of 2

  • 2