Executive Order Streamlines Cybersecurity and Reporting Expectations | Apptega

Following the massive SolarWinds attack that affected several federal agencies and private companies late last year, U.S. President Joe Biden announced in early 2021 his intentions to issue an Executive Order (EO) mandating that all software vendo… Continue reading Executive Order Streamlines Cybersecurity and Reporting Expectations | Apptega

Microsoft GCC or GCC High for CMMC and DFARS Compliance? | Apptega

Are you evaluating a move to Microsoft GCC or GCC High as you prepare for CMMC?
The post Microsoft GCC or GCC High for CMMC and DFARS Compliance? | Apptega appeared first on Security Boulevard.
Continue reading Microsoft GCC or GCC High for CMMC and DFARS Compliance? | Apptega

Unlocking the Mysteries of the Fed’s New CMMC Requirement

There’s a lot of uncertainty around the Cybersecurity Maturity Model Certification (CMMC). In this episode of Security on Cloud, Tony Bai, Director of Federal Practice Lead at A-LIGN, joined us to explain the CMMC framework, its importance, and why it’… Continue reading Unlocking the Mysteries of the Fed’s New CMMC Requirement

Unlocking the Mysteries of the Fed’s New CMMC Requirement

There’s a lot of uncertainty around the Cybersecurity Maturity Model Certification (CMMC). In this episode of Security on Cloud, Tony Bai, Director of Federal Practice Lead at A-LIGN, joined us to explain the CMMC framework, its importance, and why it’… Continue reading Unlocking the Mysteries of the Fed’s New CMMC Requirement

CMMC Compliance Soon Required for Government Contractors & Subcontracts

Background: NIST SP 800-171 and NIST SP 800-53
If you are currently conducting business with the US government, directly as a contractor or indirectly as a subcontractor, you’re probably familiar with the requirement to comply with the NIST … Continue reading CMMC Compliance Soon Required for Government Contractors & Subcontracts

What actually happens when a company examines third-party risk

For a moment, look past Russian cybercriminals, North Korean cryptocurrency scams and the idea that election infrastructure used by democracies around the world lacks meaningful digital safeguards. While those issues are significant, people in charge of information security at large U.S. companies spend the majority of their time assessing whether their firm is likely to experience a data breach that begins outside of their own proprietary network. That assessment goes beyond the deluge of obfuscated code, technical jargon or marketing pitches. It’s rooted in crunching numbers in Excel spreadsheets and other measuring strategies that can quantify whether their partners and vendors are prepared to keep hackers out. Security bosses at Fortune 500 companies traditionally have compelled partners to answer monotonous questionnaires about their cyber readiness. Private sector surveys, including some obtained by CyberScoop, typically include hundreds, and sometimes thousands, of arcane questions meant to elicit information about how firms use encryption, require […]

The post What actually happens when a company examines third-party risk appeared first on CyberScoop.

Continue reading What actually happens when a company examines third-party risk

When it Comes to NIST 800-171 Compliance – There’s ‘On Time’ and There’s ‘Lombardi Time’

If you wait to become 800-171 compliant, you won’t win contracts. That was the message we wanted to make loud and clear to over 200 federal contractors during last week’s Washington Technology (WT) webcast, Inside NIST 800-171: Cyber Requir… Continue reading When it Comes to NIST 800-171 Compliance – There’s ‘On Time’ and There’s ‘Lombardi Time’

What’s at Stake with NIST 800-171 and How to Ensure You’re Compliant

Over the past three years, The National Center for Standard and Technology defined 800-171 security requirements. These requirements were designed to protect Controlled Unclassified Information in Nonfederal information systems, as well as organiz… Continue reading What’s at Stake with NIST 800-171 and How to Ensure You’re Compliant