What are DoD and CMMC Password Requirements?
Much like complying with government regulations, password requirements for handling Controlled Unclassified Information (CUI) are an intricate interpretation of different guidelines and protocols.
We're here to break down the requirements,…
5 Surefire Ways to Ensure Cloud Network Security for Your Business
As wonderful as the cloud may seem to be for flexibility, efficiency and collaboration, the added security gaps can make any IT department quiver.
In this article, we’ll cover the basics of what cloud network security is, how it differs…
Department of Defense (DoD) Memo Announces Plans to Finalize Rulemaking and Assess NIST 800-171 Compliance
The DoD is planning to issue a final rule in December establishing a procedure for DoD acquisition officials to perform assessments of a contractor’s compliance with NIST Special Publication (SP) 800-171.
According to Inside Cybersecurity,…
Vishing vs Phishing: Know the Difference
It can feel like there is a new term for cyberattacks to learn every day. But knowing the different types of attacks and knowing what to look for can mean the difference between a secure network and a multi-million dollar data breach.
In…
Are You Prepared for a DCMA Review of your NIST 800-171 Assessment?
The Defense Contract Management Agency (DCMA) is planning to evaluate the information submitted by contractors on their compliance with NIST 800-171. The goal is to better understand whether the defense industrial base (DIB) is meeting contract…
The Pentagon Updates CMMC Timeline
When CMMC 2.0 was announced in 2021, the original timeline included a 9-24 month implementation process. Since then, we have all been anxiously awaiting to hear if this was on track.
In an event hosted by NDIA New England, Stacy Bostjanick,…