RMF Continuous Monitoring (When You’re Out of Bandwidth)

Posted on:

In This Article

  • Capability and budgets are not able to increase at the same rate as the complexity of the Risk Management Framework (RMF) and Continuous Monitoring.
  • In 2019, Defense[...]

Read More

NIST SP 800-172: Enhanced Guidelines & Standards for CMMC

Posted on:

In this Article

  • NIST Special Publication 800-172 (formerly known as 171B) “Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations: Enhanced Security Requirements[...]

Read More

CMMC Series Part 4: The 3 Most Common Issues in the CMMC Gap Analysis

Posted on:

In this Article

  • Learn about the most common findings we find identity in CMMC Gap Analyses.
  • Learn how your organization can avoid these gaps on your path to CMMC.

#1. You Don’t Have Enough[...]

Read More

CMMC Series Part 3: Approaching the Essential CMMC Gap Analysis

Posted on:

In this Article:

  • Learn about action items leading up to CMMC preparation.
  • Learn what to do when your organization is ready to begin CMMC preparation.
  • Learn what goes into a CMMC Gap Analysis, and[...]

Read More

SecureStrux Becomes a CMMC Registered Provider Organization (RPO)

Posted on:

The Cybersecurity Maturity Model Certification Accreditation Body (CMMC-AB) is the entity responsible for launching and overseeing the Cybersecurity Model Certification (CMMC) program for the[...]

Read More

PowerStrux Standalone Auditor 5.0 Release and Updates

Posted on:

Introduction

Event monitoring is a challenging and intimidating task. A properly configured audit policy results in an extreme number of captured events, contributing to the difficult nature of[...]

Read More

CMMC Series Part 2: Ensuring the Right CMMC Level for Your Organization

Posted on:

In This Article

  • Learn how to determine the right CMMC level for your organization to win your DoD contracts going forward.
  • Learn how to ensure that your subcontractors are also ready for the[...]

Read More

CMMC Series Part 1: The Background & Timeline for 2021

Posted on:

In This Article

  • Learn the differences between Federal Contract Information (FCI), Controlled Unclassified Information (CUI), and Controlled Technical Information (CTI) within the Cybersecurity[...]

Read More

Applying Configuration with Microsoft’s LGPO Utility

Posted on:

Microsoft’s Local Group Policy Object (LGPO) Utility is a standalone command-line executable that assists administrators in automating the management of a computer’s local security policy. The[...]

Read More

How CMMC Registered Practitioners Help Achieve Compliance

Posted on:

What is a CMMC RP?

The CMMC Accreditation Body (CMMC-AB), the entity which is responsible for launching the Cybersecurity Maturity Model Certification (CMMC) for the US Department of Defense[...]

Read More

Page 1 of 10 1 2 3 4 5 ... 10 » Last