Resources

Learn more about Abacode! Here you can find more information about our services and read our latest news and blogs!

Featured
Abacode White Paper - Solving for cybersecurity - The reality of IT Leaders at SMBs
White Paper
Solving for Cybersecurity – The Reality of IT Leaders at SMBs

In today’s fast-evolving threat landscape, small to medium-sized businesses (SMBs) face increasing cybersecurity challenges.

Learn More
Filter by:

Asset Type

Tags

  • Blog

  • CMMC MASTERCLASS - Section 4 - Program Management & Maintenance
    Blog

    CMMC MASTERCLASS - Section 4 - Program Management & Maintenance

    In this section, you'll learn the critical components for ongoing success, including: Continuous Monitoring & Improvement, Policy & Procedure Update, Employee T...

    December 3, 2024
  • CMMC MASTERCLASS Section 03 - Program Emplementation
    Blog

    CMMC MASTERCLASS: Section 3 - Program Establishment

    In this section, learn how to effectively establish a CMMC (Cybersecurity Maturity Model Certification) program in this comprehensive masterclass by Abacode.

    November 25, 2024
  • CMMC MASTERCLASS 02 - CMMC Program Assessment & System Security Plan
    Blog

    CMMC MASTERCLASS 02 - CMMC Program Assessment & System Security Plan

    CMMC MASTERCLASS Section 02 - CMMC Program Assessment and System Security Plan. Join Bryan Graf, as he takes you through everything you...

    November 18, 2024
  • CMMC-MASTERCLASS-Section-01---What-is-CMMC
    Blog

    CMMC MASTERCLASS: Section 1 - What is CMMC?

    CMMC MASTERCLASS Section 01 - What is CMMC? Join Bryan Graf, as he takes you through everything you need to know about the CMMC requirement..

    November 15, 2024
  • Blog

    Insights from Hacker Summer Camp ‘24 

    Our CTO, Jeremy Rasmussen, discusses his insights and learnings from Hacker Summer Camp 2024 in Las Vegas.

    August 14, 2024
  • Blog

    Why Choose a Managed Cybersecurity Program?

    For small to mid-sized businesses, managing cybersecurity in-house can be challenging, costly, and inefficient. This is where a managed cybersecurity program be...

    August 8, 2024
  • Blog

    Breakdown of Third-Party Risk Management

    As businesses become increasingly reliant on external vendors and partners to enhance their operations, the importance of Third Party Risk Management (TPRM) has...

    July 16, 2024
  • Blog

    Zero Trust Architecture: An Overview of its Principles

    In recent years, the frequency and severity of security breaches have increased, prompting businesses to adopt stronger security measures. One such approach is ...

    July 8, 2024
  • Blog

    Cybersecurity Playbook for Multifamily Housing IT Enterprises

    If you are one of those hundreds of thousands of people who have been given the reins of an I.T. infrastructure in multifamily housing property management and d...

  • 1 of 3

  • 3