OthersPress Release We are happy to announce that Canfield CyberDefense Group, has been approved to be a Certified Third-party Assessor Organization (C3PAO).Olumide AkinwekomiAugust 2, 2021
Others Continuous Risk Assessment and Information Technology (IT) Environment’s Health Every organization, regardless of its mission statement or business operating sector, has its own risk profile. Each organization should carry…Olumide AkinwekomiJuly 28, 2021
AI Cybersecurity Software ProductOthersThreat Post Defending Against the Current Russian Cyber Threats The Federal Bureau of Investigation (FBI) and the Cybersecurity and Infrastructure Security Agency (CISA) released a joint cybersecurity advisory about…Olumide AkinwekomiMay 17, 2021
Breaches and incidentsOthers How Are You Prioritizing Resilience in the Cyberspace? Cyber resilience is an Enterprise's ability to plan, adapt, and recover when cyberattacks occur. If an Enterprise can protect itself…Olumide AkinwekomiFebruary 18, 2021
AI Cybersecurity Software Product Cybersecurity Maturity Model Certification (CMMC) Compliance Software Tool CCG’s Artificial Intelligent software, CheckMate, is designed to meet, benefit, greatly simplify, and provide an economical cost reduction in the…Olumide AkinwekomiJanuary 18, 2021
Others Warning on VPN Vulnerability As the organization adapts to Coronavirus, there is a spike in remote work. Organizations are required to connect to remote…Olumide AkinwekomiOctober 28, 2020
Security Events CYBER SECURITY: A REQUIRED MEASURE FOR ALL ORGANIZATIONS It is important to put cybersecurity measures in place due to the fact that all organizations collect, process, and store…Olumide AkinwekomiSeptember 3, 2020
Others CYBERSECURITY IN THIS DISPENSATION In the last few years, the cybersecurity practice force is changing speedily, and the impact of this test becomes more…Olumide AkinwekomiAugust 3, 2020
Threat Post Chinese Infiltration in U.S Reaches ‘Extreme’ Level China is actively running cyber threats against all businesses and CCG / Phen found an 0-day Hardware based data exfiltration…Olumide AkinwekomiJuly 22, 2020
AI Cybersecurity Software Product Phen’s 0-day discovery and Chinese infiltration exploit. A company purchased and installed a wi-fi, 6 port router (a Chinese made JHC device) in their network. Within several…Olumide AkinwekomiJuly 22, 2020