Suppose you were to visit the break room of one of the vendors for the Department of Defense. In that case, chances are that the government’s new Cybersecurity Maturity Model Certification (CMMC) compliance standard is a water-cooler hot topic. Still, there’s a...
Key Terms Audit – the process of assessing an organization’s cybersecurity maturity in order to achieve CMMC compliance. CMMC evaluates contractors on a range of five compliance levels used to assess the risk they pose when they use, store, and transmit data....
CMMC Frequently Asked Questions What Is CMMC? The Cybersecurity Maturity Model Certification is a unifying standard for the implementation of cybersecurity across the Defense Industrial Base (DIB). It is designed to protect Federal Contract Information (FCI) and...
What Is CMMC? The Cybersecurity Maturity Model Certification (CMMC) was developed by the Office of the Under Secretary of Defense for Acquisition and Sustainment. CMMC was designed to help better protect Federal Contract Information (FCI) and Controlled Unclassified...
Which Form of Encryption is the Most Secure? Remember back when data breaches were something we heard about every once in a while? Nowadays, reports of them are as reliable as sports scores on the daily news. The constant threat has companies scrambling to not only...
What is an Encryption Certificate? The National Institute of Standards and Technology, or NIST, defines an encryption certificate as “a certificate containing a public key that can encrypt or decrypt electronic messages, files, documents, or data transmissions, or...