Duo Beyond

Duo Beyond

Modern enterprises demand agility. The cloud has made workforce mobility and BYOD the new norm, sparking a digital transformation that has rendered traditional perimeter-based security measures inadequate. It’s no longer safe to assume traffic within your enterprise’s...
The Microsoft O365 License Map

The Microsoft O365 License Map

Choosing the tools to become compliant can be confusing. Most confusing of all might be which CMMC Compliant Microsoft O365 License is right for your business. By using the Microsoft O365 Licenses Map, you will be able to answer questions like: Which licenses can I...
The Complete Guide to Ransomware

The Complete Guide to Ransomware

This guide shares the expert knowledge that researchers at LogRhythm have gathered about how ransomware attacks start, how they progress through an organization’s endpoints and broader network, and what you can do to prevent them — or at least shut them down — to...
ISSA Event: CMMC From the Sub’s Perspective

ISSA Event: CMMC From the Sub’s Perspective

Simple Helix partnered with the North Alabama Chapter of the Information Systems Security Association (NAC-ISSA) to host a virtual discussion panel event on September 15, 2020. During the event, the CMMC discussion was examined through the lens of the...