[{"id":168,"link":"https:\/\/quatronics.com\/definitive-media-library\/","name":"definitive-media-library","thumbnail":{"url":false,"alt":false},"title":"Definitive Media Library","excerpt":"","content":"Securely managing software and system configurations is a challenge. But software and system configuration management is critical to information security. This is where a Definitive","author":{"name":"Brenda Harper","link":"https:\/\/quatronics.com\/author\/brendaharper1\/"},"date":"Sep 16, 2024","dateGMT":"2024-09-16 17:37:22","modifiedDate":"2024-09-17 17:56:30","modifiedDateGMT":"2024-09-17 17:56:30","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/quatronics.com\/category\/uncategorized\/\" rel=\"category tag\">Uncategorized<\/a>","space":"<a href=\"https:\/\/quatronics.com\/category\/uncategorized\/\" rel=\"category tag\">Uncategorized<\/a>"},"taxonomies":{"post_tag":"<a href='https:\/\/quatronics.com\/tag\/baselineconfiguration\/' rel='post_tag'>#BaselineConfiguration<\/a><a href='https:\/\/quatronics.com\/tag\/changecontrol\/' rel='post_tag'>#ChangeControl<\/a><a href='https:\/\/quatronics.com\/tag\/cmmc\/' rel='post_tag'>#CMMC<\/a><a href='https:\/\/quatronics.com\/tag\/compliance\/' rel='post_tag'>#Compliance<\/a><a href='https:\/\/quatronics.com\/tag\/cybersecurity\/' rel='post_tag'>#Cybersecurity<\/a><a href='https:\/\/quatronics.com\/tag\/definitivemedialibrary\/' rel='post_tag'>#DefinitiveMediaLibrary<\/a><a href='https:\/\/quatronics.com\/tag\/itil\/' rel='post_tag'>#ITIL<\/a><a href='https:\/\/quatronics.com\/tag\/itmanagement\/' rel='post_tag'>#ITmanagement<\/a><a href='https:\/\/quatronics.com\/tag\/nist\/' rel='post_tag'>#NIST<\/a><a href='https:\/\/quatronics.com\/tag\/softwaresecurity\/' rel='post_tag'>#softwaresecurity<\/a>"},"readTime":{"min":1,"sec":46},"status":"publish"},{"id":165,"link":"https:\/\/quatronics.com\/unauthorized-vulnerability-scans\/","name":"unauthorized-vulnerability-scans","thumbnail":{"url":false,"alt":false},"title":"Unauthorized Vulnerability Scans","excerpt":"","content":"It\u2019s Friday afternoon at Quantum Naval Solutions. A network intrusion detection system has identified vulnerability scanning activity from an internal IP address. The activity stops,","author":{"name":"Brenda Harper","link":"https:\/\/quatronics.com\/author\/brendaharper1\/"},"date":"Sep 15, 2024","dateGMT":"2024-09-15 15:41:15","modifiedDate":"2024-09-17 17:37:15","modifiedDateGMT":"2024-09-17 17:37:15","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/quatronics.com\/category\/uncategorized\/\" rel=\"category tag\">Uncategorized<\/a>","space":"<a href=\"https:\/\/quatronics.com\/category\/uncategorized\/\" rel=\"category tag\">Uncategorized<\/a>"},"taxonomies":{"post_tag":"<a href='https:\/\/quatronics.com\/tag\/cmmc\/' rel='post_tag'>#CMMC<\/a><a href='https:\/\/quatronics.com\/tag\/cybersecurity\/' rel='post_tag'>#Cybersecurity<\/a><a href='https:\/\/quatronics.com\/tag\/incidentresponse\/' rel='post_tag'>#IncidentResponse<\/a><a href='https:\/\/quatronics.com\/tag\/networksecurity\/' rel='post_tag'>#NetworkSecurity<\/a><a href='https:\/\/quatronics.com\/tag\/nist800171\/' rel='post_tag'>#NIST800171<\/a><a href='https:\/\/quatronics.com\/tag\/riskmanagement\/' rel='post_tag'>#RiskManagement<\/a>"},"readTime":{"min":1,"sec":46},"status":"publish"},{"id":163,"link":"https:\/\/quatronics.com\/rogue-wifi-plan-of-action\/","name":"rogue-wifi-plan-of-action","thumbnail":{"url":false,"alt":false},"title":"Rogue WiFi: Plan of Action","excerpt":"","content":"Your technical sales support person is the most knowledgeable person in your company about WiFi. She discovers that problems with connections may be caused by","author":{"name":"Brenda Harper","link":"https:\/\/quatronics.com\/author\/brendaharper1\/"},"date":"Sep 12, 2024","dateGMT":"2024-09-12 03:07:22","modifiedDate":"2024-09-17 15:35:37","modifiedDateGMT":"2024-09-17 15:35:37","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/quatronics.com\/category\/uncategorized\/\" rel=\"category tag\">Uncategorized<\/a>","space":"<a href=\"https:\/\/quatronics.com\/category\/uncategorized\/\" rel=\"category tag\">Uncategorized<\/a>"},"taxonomies":{"post_tag":"<a href='https:\/\/quatronics.com\/tag\/cmmc\/' rel='post_tag'>#CMMC<\/a><a href='https:\/\/quatronics.com\/tag\/cybersecurity\/' rel='post_tag'>#Cybersecurity<\/a><a href='https:\/\/quatronics.com\/tag\/incidentresponse\/' rel='post_tag'>#IncidentResponse<\/a><a href='https:\/\/quatronics.com\/tag\/infosec\/' rel='post_tag'>#Infosec<\/a><a href='https:\/\/quatronics.com\/tag\/networksecurity\/' rel='post_tag'>#NetworkSecurity<\/a><a href='https:\/\/quatronics.com\/tag\/wirelesssecurity\/' rel='post_tag'>#WirelessSecurity<\/a>"},"readTime":{"min":2,"sec":11},"status":"publish"},{"id":160,"link":"https:\/\/quatronics.com\/rogue-wifi-part-1rogue-wifi\/","name":"rogue-wifi-part-1rogue-wifi","thumbnail":{"url":false,"alt":false},"title":"Rogue WiFi - Part 1","excerpt":"","content":"Imagine this: Your team is suddenly experiencing flaky WiFi access. Users are getting connected, disconnected, reconnected\u2014sometimes multiple times this morning. When they\u2019re connected, everything seems","author":{"name":"Brenda Harper","link":"https:\/\/quatronics.com\/author\/brendaharper1\/"},"date":"Sep 11, 2024","dateGMT":"2024-09-11 15:01:00","modifiedDate":"2024-09-15 03:06:29","modifiedDateGMT":"2024-09-15 03:06:29","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/quatronics.com\/category\/uncategorized\/\" rel=\"category tag\">Uncategorized<\/a>","space":"<a href=\"https:\/\/quatronics.com\/category\/uncategorized\/\" rel=\"category tag\">Uncategorized<\/a>"},"taxonomies":{"post_tag":"<a href='https:\/\/quatronics.com\/tag\/cmmc\/' rel='post_tag'>#CMMC<\/a><a href='https:\/\/quatronics.com\/tag\/cybersecurity\/' rel='post_tag'>#Cybersecurity<\/a><a href='https:\/\/quatronics.com\/tag\/incidentresponse\/' rel='post_tag'>#IncidentResponse<\/a><a href='https:\/\/quatronics.com\/tag\/infosec\/' rel='post_tag'>#Infosec<\/a><a href='https:\/\/quatronics.com\/tag\/networksecurity\/' rel='post_tag'>#NetworkSecurity<\/a><a href='https:\/\/quatronics.com\/tag\/wirelesssecurity\/' rel='post_tag'>#WirelessSecurity<\/a>"},"readTime":{"min":0,"sec":33},"status":"publish"},{"id":158,"link":"https:\/\/quatronics.com\/post-incident-recovery\/","name":"post-incident-recovery","thumbnail":{"url":false,"alt":false},"title":"Post-Incident Recovery","excerpt":"","content":"Post-Incident Recovery is the final stage of a well-written Incident Response Plan. Once a security incident is fully resolved, the work shouldn\u2019t stop there. Post-incident","author":{"name":"Brenda Harper","link":"https:\/\/quatronics.com\/author\/brendaharper1\/"},"date":"Sep 9, 2024","dateGMT":"2024-09-09 14:52:00","modifiedDate":"2024-09-15 02:58:31","modifiedDateGMT":"2024-09-15 02:58:31","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/quatronics.com\/category\/uncategorized\/\" rel=\"category tag\">Uncategorized<\/a>","space":"<a href=\"https:\/\/quatronics.com\/category\/uncategorized\/\" rel=\"category tag\">Uncategorized<\/a>"},"taxonomies":{"post_tag":"<a href='https:\/\/quatronics.com\/tag\/businesscontinuity\/' rel='post_tag'>#BusinessContinuity<\/a><a href='https:\/\/quatronics.com\/tag\/cmmc\/' rel='post_tag'>#CMMC<\/a><a href='https:\/\/quatronics.com\/tag\/cybersecurity\/' rel='post_tag'>#Cybersecurity<\/a><a href='https:\/\/quatronics.com\/tag\/dfars\/' rel='post_tag'>#DFARS<\/a><a href='https:\/\/quatronics.com\/tag\/incidentresponse\/' rel='post_tag'>#IncidentResponse<\/a><a href='https:\/\/quatronics.com\/tag\/infosec\/' rel='post_tag'>#Infosec<\/a><a href='https:\/\/quatronics.com\/tag\/postincidentrecovery\/' rel='post_tag'>#PostIncidentRecovery<\/a>"},"readTime":{"min":1,"sec":27},"status":"publish"},{"id":150,"link":"https:\/\/quatronics.com\/recovery-in-the-incident-response-plan\/","name":"recovery-in-the-incident-response-plan","thumbnail":{"url":false,"alt":false},"title":"Recovery in the Incident Response Plan","excerpt":"","content":"Let\u2019s talk about Recovery from a cybersecurity incident. Recovery is the last part of the third phase of an effective Incident Response Plan. Recovery involves","author":{"name":"Brenda Harper","link":"https:\/\/quatronics.com\/author\/brendaharper1\/"},"date":"Sep 5, 2024","dateGMT":"2024-09-05 18:08:21","modifiedDate":"2024-09-05 18:08:21","modifiedDateGMT":"2024-09-05 18:08:21","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/quatronics.com\/category\/uncategorized\/\" rel=\"category tag\">Uncategorized<\/a>","space":"<a href=\"https:\/\/quatronics.com\/category\/uncategorized\/\" rel=\"category tag\">Uncategorized<\/a>"},"taxonomies":{"post_tag":"<a href='https:\/\/quatronics.com\/tag\/businesscontinuity\/' rel='post_tag'>#BusinessContinuity<\/a><a href='https:\/\/quatronics.com\/tag\/cmmc\/' rel='post_tag'>#CMMC<\/a><a href='https:\/\/quatronics.com\/tag\/cybersecurity\/' rel='post_tag'>#Cybersecurity<\/a><a href='https:\/\/quatronics.com\/tag\/dfars\/' rel='post_tag'>#DFARS<\/a><a href='https:\/\/quatronics.com\/tag\/incidentresponse\/' rel='post_tag'>#IncidentResponse<\/a><a href='https:\/\/quatronics.com\/tag\/infosec\/' rel='post_tag'>#Infosec<\/a>"},"readTime":{"min":1,"sec":9},"status":"publish"},{"id":148,"link":"https:\/\/quatronics.com\/eradication-in-the-incident-response-plan\/","name":"eradication-in-the-incident-response-plan","thumbnail":{"url":false,"alt":false},"title":"Eradication in the Incident Response Plan","excerpt":"","content":"Let\u2019s talk about Eradication. Eradication is a critical part of the third phase of an effective Incident Response Plan. It involves eliminating the root cause","author":{"name":"Brenda Harper","link":"https:\/\/quatronics.com\/author\/brendaharper1\/"},"date":"Sep 4, 2024","dateGMT":"2024-09-04 17:38:08","modifiedDate":"2024-09-05 18:02:00","modifiedDateGMT":"2024-09-05 18:02:00","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/quatronics.com\/category\/uncategorized\/\" rel=\"category tag\">Uncategorized<\/a>","space":"<a href=\"https:\/\/quatronics.com\/category\/uncategorized\/\" rel=\"category tag\">Uncategorized<\/a>"},"taxonomies":{"post_tag":"<a href='https:\/\/quatronics.com\/tag\/cmmc\/' rel='post_tag'>#CMMC<\/a><a href='https:\/\/quatronics.com\/tag\/cybersecurity\/' rel='post_tag'>#Cybersecurity<\/a><a href='https:\/\/quatronics.com\/tag\/cybersecurity-incidentresponse-cmmc-dfars-infosec-businesscontinuity\/' rel='post_tag'>#Cybersecurity #IncidentResponse #CMMC #DFARS #Infosec #BusinessContinuity<\/a><a href='https:\/\/quatronics.com\/tag\/dfars\/' rel='post_tag'>#DFARS<\/a><a href='https:\/\/quatronics.com\/tag\/incidentresponse\/' rel='post_tag'>#IncidentResponse<\/a><a href='https:\/\/quatronics.com\/tag\/infosec\/' rel='post_tag'>#Infosec<\/a>"},"readTime":{"min":1,"sec":32},"status":"publish"},{"id":142,"link":"https:\/\/quatronics.com\/strengthening-your-incident-response-with-effective-containment\/","name":"strengthening-your-incident-response-with-effective-containment","thumbnail":{"url":false,"alt":false},"title":"Strengthening Your Incident Response with Effective Containment","excerpt":"","content":"Containment, Eradication, and Recovery is the third element of an effective Incident Response Plan. Let\u2019s talk about Containment. The strategies you choose to contain an","author":{"name":"Brenda Harper","link":"https:\/\/quatronics.com\/author\/brendaharper1\/"},"date":"Sep 3, 2024","dateGMT":"2024-09-03 20:48:43","modifiedDate":"2024-09-03 21:31:43","modifiedDateGMT":"2024-09-03 21:31:43","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/quatronics.com\/category\/uncategorized\/\" rel=\"category tag\">Uncategorized<\/a>","space":"<a href=\"https:\/\/quatronics.com\/category\/uncategorized\/\" rel=\"category tag\">Uncategorized<\/a>"},"taxonomies":{"post_tag":""},"readTime":{"min":2,"sec":12},"status":"publish"},{"id":152,"link":"https:\/\/quatronics.com\/enhancing-your-incident-response-with-effective-detection-and-analysis\/","name":"enhancing-your-incident-response-with-effective-detection-and-analysis","thumbnail":{"url":false,"alt":false},"title":"Enhancing Your Incident Response with Effective Detection and Analysis","excerpt":"","content":"Detection and Analysis is the second phase of a robust Incident Response Plan. This phase is where the groundwork laid during preparation pays off. Imagine","author":{"name":"Brenda Harper","link":"https:\/\/quatronics.com\/author\/brendaharper1\/"},"date":"Sep 3, 2024","dateGMT":"2024-09-03 18:20:42","modifiedDate":"2024-09-05 19:14:21","modifiedDateGMT":"2024-09-05 19:14:21","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/quatronics.com\/category\/uncategorized\/\" rel=\"category tag\">Uncategorized<\/a>","space":"<a href=\"https:\/\/quatronics.com\/category\/uncategorized\/\" rel=\"category tag\">Uncategorized<\/a>"},"taxonomies":{"post_tag":"<a href='https:\/\/quatronics.com\/tag\/cmmc\/' rel='post_tag'>#CMMC<\/a><a href='https:\/\/quatronics.com\/tag\/continuousimprovement\/' rel='post_tag'>#ContinuousImprovement<\/a><a href='https:\/\/quatronics.com\/tag\/cybersecurity\/' rel='post_tag'>#Cybersecurity<\/a><a href='https:\/\/quatronics.com\/tag\/dfars\/' rel='post_tag'>#DFARS<\/a><a href='https:\/\/quatronics.com\/tag\/incidentresponse\/' rel='post_tag'>#IncidentResponse<\/a><a href='https:\/\/quatronics.com\/tag\/infosec\/' rel='post_tag'>#Infosec<\/a><a href='https:\/\/quatronics.com\/tag\/itsecurity\/' rel='post_tag'>#ITSecurity<\/a>"},"readTime":{"min":1,"sec":11},"status":"publish"},{"id":133,"link":"https:\/\/quatronics.com\/building-a-strong-cmmc-partnership-the-power-of-the-shared-responsibility-matrix\/","name":"building-a-strong-cmmc-partnership-the-power-of-the-shared-responsibility-matrix","thumbnail":{"url":false,"alt":false},"title":"Building a Strong CMMC Partnership: The Power of the Shared Responsibility Matrix","excerpt":"","content":"A Shared Responsibility Matrix is a simple but powerful tool. It clearly shows who is responsible for what in a partnership between a customer and","author":{"name":"Brenda Harper","link":"https:\/\/quatronics.com\/author\/brendaharper1\/"},"date":"Aug 19, 2024","dateGMT":"2024-08-19 17:09:13","modifiedDate":"2024-08-19 17:09:13","modifiedDateGMT":"2024-08-19 17:09:13","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/quatronics.com\/category\/uncategorized\/\" rel=\"category tag\">Uncategorized<\/a>","space":"<a href=\"https:\/\/quatronics.com\/category\/uncategorized\/\" rel=\"category tag\">Uncategorized<\/a>"},"taxonomies":{"post_tag":""},"readTime":{"min":0,"sec":52},"status":"publish"},{"id":139,"link":"https:\/\/quatronics.com\/cmmc-compliance-building-a-strong-partnership-with-shared-responsibilities\/","name":"cmmc-compliance-building-a-strong-partnership-with-shared-responsibilities","thumbnail":{"url":false,"alt":false},"title":"CMMC Compliance: Building a Strong Partnership with Shared Responsibilities","excerpt":"","content":"A Shared Responsibility Matrix is a simple but powerful tool. It clearly shows who is responsible for what in a partnership between a customer and","author":{"name":"Brenda Harper","link":"https:\/\/quatronics.com\/author\/brendaharper1\/"},"date":"Aug 18, 2024","dateGMT":"2024-08-18 16:27:43","modifiedDate":"2024-08-29 16:28:18","modifiedDateGMT":"2024-08-29 16:28:18","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/quatronics.com\/category\/uncategorized\/\" rel=\"category tag\">Uncategorized<\/a>","space":"<a href=\"https:\/\/quatronics.com\/category\/uncategorized\/\" rel=\"category tag\">Uncategorized<\/a>"},"taxonomies":{"post_tag":""},"readTime":{"min":0,"sec":52},"status":"publish"},{"id":156,"link":"https:\/\/quatronics.com\/navigating-the-intersection-of-post-quantum-encryption-and-cmmc-compliance-2\/","name":"navigating-the-intersection-of-post-quantum-encryption-and-cmmc-compliance-2","thumbnail":{"url":false,"alt":false},"title":"Navigating the Intersection of Post-Quantum Encryption and CMMC Compliance","excerpt":"","content":"This week's release of the first three post-quantum encryption standards by NIST\u2014FIPS 203, 204, and 205\u2014 marks a significant step in securing data against the","author":{"name":"Brenda Harper","link":"https:\/\/quatronics.com\/author\/brendaharper1\/"},"date":"Aug 15, 2024","dateGMT":"2024-08-15 22:51:52","modifiedDate":"2024-09-15 02:52:03","modifiedDateGMT":"2024-09-15 02:52:03","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/quatronics.com\/category\/uncategorized\/\" rel=\"category tag\">Uncategorized<\/a>","space":"<a href=\"https:\/\/quatronics.com\/category\/uncategorized\/\" rel=\"category tag\">Uncategorized<\/a>"},"taxonomies":{"post_tag":"<a href='https:\/\/quatronics.com\/tag\/cmmc\/' rel='post_tag'>#CMMC<\/a><a href='https:\/\/quatronics.com\/tag\/compliance\/' rel='post_tag'>#Compliance<\/a><a href='https:\/\/quatronics.com\/tag\/cybersecurity\/' rel='post_tag'>#Cybersecurity<\/a><a href='https:\/\/quatronics.com\/tag\/dodcontracts\/' rel='post_tag'>#DoDContracts<\/a>"},"readTime":{"min":2,"sec":4},"status":"publish"}]