top of page

The Big Blog
CMMC and the End of Passwords: Why Passkeys Are the Future of Cybersecurity and Compliance
CMMC and the End of Passwords: Why Passkeys Are the Future of Cybersecurity and Compliance
Apr 83 min read
Â
Â
CMMC Compliance — Not a New Requirement, Just Time to Prove It
In a recent episode of The Cyber Minute, Terry McGraw, CEO of Cape Endeavors, addressed a timely and often misunderstood topic in the defens
Apr 72 min read
Â
Â
Â
CMMC Level 2 Compliance: Controlling the Flow of CUI
Cybersecurity Maturity Model Certification (CMMC) Level 2 requires organizations to implement robust measures to control the flow of Controlled Unclassified Information (CUI). Practice AC.L2-3.1.3, entitle Control CUI Flow, is crucial for achieving compliance with the framework as well as actually achieving the goal of protecting sensitive data to protect the warfighter. Here are key strategies to effectively control CUI flow in accordance with CMMC Level 2 compliance: 1. The
Jun 24, 20243 min read
Â
Â
Â
SECURITY THROUGH ARCHITECTURE; THE FORGOTTEN ART OF SECURE IT DESIGN
In the ever-evolving landscape of cybersecurity, organizations often find themselves playing catch-up, implementing security measures as an afterthought or in response to breaches. However, a proactive approach to security, one that integrates it into the very fabric of an organization's IT infrastructure, can be a game-changer. This approach is known as "Security through Architecture," and it is an art that has been largely overlooked in the rush to adopt the latest security
Jun 18, 20244 min read
Â
Â
Â
CMMC Compliance and the IT Market for Lemons
The IT industry is not immune to the "Market for Lemons" phenomenon, where information asymmetry between buyers and sellers leads to adverse selection and market failure. This concept, introduced by George Akerlof in his seminal 1970 paper, has significant implications for the technology sector. The IT Lemon Problem In the IT world, the "lemons" refer to substandard or defective products, services, or solutions that fail to meet the promised quality or functionality. These le
Jun 11, 20243 min read
Â
Â
Â
CUI Spillage: A Critical Concern in CMMC Environments
In the realm of Cybersecurity Maturity Model Certification (CMMC) compliance, the protection of Controlled Unclassified Information (CUI) is paramount. CUI encompasses sensitive but unclassified data that req asures in place, incidents of CUI spillage can occur, posing significant risks to organizations operating within the Defense Industrial Base (DIB). CUI spillage refers to the accidental or unauthorized release of CUI data outside of the designated controlled environment
Jun 4, 20243 min read
Â
Â
Â
Where is my CUI???
Locating Controlled Unclassified Information (CUI) within a CMMC environment is a critical step for organizations seeking compliance with the Cybersecurity Maturity Model Certification (CMMC) framework. CUI is sensitive but unclassified information that requires protection from unauthorized access, disclosure, or misuse. Failure to properly identify and secure CUI can result in significant risks, including potential data breaches and non-compliance penalties. THE IMPORTANCE
Jun 4, 20243 min read
Â
Â
Â
Utilizing Secure Enclaves to Achieve CMMC Compliance
Achieving CMMC compliance can be a daunting task, especially for small and medium-sized defense contractors with limited resources. One effective strategy to streamline the process and reduce costs is the implementation of a secure enclave, rather than uplifting the entire organization's infrastructure. WHAT IS A CMMC SECURE ENCLAVE? A secure CMMC enclave is a secure, controlled environment within an organization's network, specifically designed to handle Controlled Unclass
Jun 4, 20242 min read
Â
Â
Â
bottom of page
