Taming the CMMC Process Means Understanding It

Military contractors of all types are trying to work through the Department of Defense’s Cybersecurity Maturity Model Certification (CMMC) 2.0. It has been something of a moving target, as the Department of Defense has changed the certification model from five levels in CMMC 1.0 to three in the current version, to better align with existing […]

Navigating the Zero Trust Maze

The federal government’s emphasis on cybersecurity for all agencies has had a dizzying effect on the regulatory environment. Agencies must address Executive Order 14028, mandating a zero trust architecture by September of 2024. To get there, they must navigate through the General Services Administration’s approved cloud offerings in the Federal Risk And Management Program (FedRAMP). Then […]

Bringing Agility to the Modern Security Operations Center

Modern security threats are evolving at a faster pace than security technologies, while well-funded threat actors are investing in tools like machine learning (ML), automation, and artificial intelligence (AI). Legacy security operations centers – SOCs – are not equipped with the tools to respond to this rapidly evolving landscape, even as the volume of traffic […]

Cyber Attacks are Just as Damaging as Natural Disasters

It has been almost seven years since the White House issued Presidential Policy Directive 40, setting out the federal continuity policy “to maintain a comprehensive and effective continuity capability through Continuity of Operations (COOP), Continuity of Government (COG), and Enduring Constitutional Government (ECG) programs, ensuring the resilience and preservation of government structure under the United […]

Scroll to Top