Resources

Learn more about Abacode! Here you can find more information about our services and read our latest news and blogs!

Featured
White Paper
CMMC 2.0 Readiness Guide – For Businesses of Any Size Evaluating How to Begin Their Journey

Learn the basics of how to start your journey to become CMMC assessment-ready before the Q1 2025 phased-rollout deadline.

Learn More
Filter by:

Asset Type

Tags

  • Blog

  • Abacode header image
    Blog

    Integrating CMMC Training into Existing Employee Programs

    Enhance your cybersecurity readiness through integrated training programs offered by Abacode.

    May 6, 2024
  • What is CMMC
    Blog

    What is Cybersecurity Maturity Model Certification (CMMC)?

    The Cybersecurity Maturity Model Certification (CMMC) program isn't just an option when seeking contract awards with the U.S. government – it's a necessity.

  • Abacode-Blog-CMMC-2.0-Introduction
    Blog

    CMMC 2.0 Update

    As covered in the Cyber AB Townhall webinar, CMMC 2.0 is now required for all contractors and subcontractors of the DoD.

  • Roadmap to CMMC
    Blog

    The Roadmap to CMMC Compliance

    Understanding CMMC is no longer an option; it's a necessity for businesses vying for government contracts, particularly with the DoD.

  • abacode header image
    Blog

    The XZ Backdoor: Hijacking and subsequent planting of a backdoor

    Over Easter weekend, more facts came to light about the hijacking and subsequent planting of a backdoor in the open source XZ project.

    April 1, 2024
  • MCCP
    Blog

    ACG Endorsed Partner Provider for MCCP Core

    Abacode Cybersecurity & Compliance has created a strategic partnership with the Association for Corporate Growth (ACG). Through this partnership, Abacode is ACG...

  • HFS Research logo
    Blog

    Abacode targets firms’ ecosystem-wide cyber threat

    More than 60% of ransomware attacks originate in a company’s third-party partner.

    August 4, 2023
  • How Hackers Can Circumvent Multi-Factor Authentication
    Blog

    How Hackers Can Circumvent Multi-Factor Authentication

    While MFA significantly enhances security, no system is entirely immune to sophisticated hacking attempts.

    August 14, 2023
  • The True Cost of Continuous Monitoring & Incident Response
    Blog

    The True Cost of Continuous Monitoring & Incident Response

    Perhaps you’re evaluating Security Information and Event Management (SIEM) solutions and Security Operations Center (SOC) services.

    May 23, 2023
  • 2

  • 2 of 3

  • 3