[{"id":430,"link":"https:\/\/quatronics.com\/understanding-fedramp-and-fips-140-2\/","name":"understanding-fedramp-and-fips-140-2","thumbnail":{"url":false,"alt":false},"title":"Understanding FedRAMP\u00ae and FIPS 140-2","author":{"name":"James Harper","link":"https:\/\/quatronics.com\/author\/james\/"},"date":"Feb 13, 2025","dateGMT":"2025-02-13 00:54:40","modifiedDate":"2025-02-13 00:54:41","modifiedDateGMT":"2025-02-13 00:54:41","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/quatronics.com\/category\/uncategorized\/\" rel=\"category tag\">Uncategorized<\/a>","space":"<a href=\"https:\/\/quatronics.com\/category\/uncategorized\/\" rel=\"category tag\">Uncategorized<\/a>"},"taxonomies":{"post_tag":"","series":""},"readTime":{"min":2,"sec":37},"status":"publish","excerpt":""},{"id":428,"link":"https:\/\/quatronics.com\/the-philosophy-of-an-effective-system-security-plan-ssp-a-roadmap-to-cmmc-compliance\/","name":"the-philosophy-of-an-effective-system-security-plan-ssp-a-roadmap-to-cmmc-compliance","thumbnail":{"url":false,"alt":false},"title":"The Philosophy of an Effective System Security Plan (SSP): A Roadmap to CMMC Compliance","author":{"name":"James Harper","link":"https:\/\/quatronics.com\/author\/james\/"},"date":"Feb 12, 2025","dateGMT":"2025-02-12 22:37:16","modifiedDate":"2025-02-12 22:37:18","modifiedDateGMT":"2025-02-12 22:37:18","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/quatronics.com\/category\/uncategorized\/\" rel=\"category tag\">Uncategorized<\/a>","space":"<a href=\"https:\/\/quatronics.com\/category\/uncategorized\/\" rel=\"category tag\">Uncategorized<\/a>"},"taxonomies":{"post_tag":"","series":""},"readTime":{"min":5,"sec":5},"status":"publish","excerpt":""},{"id":412,"link":"https:\/\/quatronics.com\/cmmc-and-iso-9001-synergies\/","name":"cmmc-and-iso-9001-synergies","thumbnail":{"url":false,"alt":false},"title":"CMMC and ISO 9001 Synergies","author":{"name":"James Harper","link":"https:\/\/quatronics.com\/author\/james\/"},"date":"Feb 2, 2025","dateGMT":"2025-02-02 23:00:00","modifiedDate":"2025-02-02 22:39:12","modifiedDateGMT":"2025-02-02 22:39:12","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/quatronics.com\/category\/uncategorized\/\" rel=\"category tag\">Uncategorized<\/a>","space":"<a href=\"https:\/\/quatronics.com\/category\/uncategorized\/\" rel=\"category tag\">Uncategorized<\/a>"},"taxonomies":{"post_tag":"<a href='https:\/\/quatronics.com\/tag\/cmmc-2\/' rel='post_tag'>CMMC<\/a><a href='https:\/\/quatronics.com\/tag\/iso-9001\/' rel='post_tag'>ISO 9001<\/a>","series":""},"readTime":{"min":2,"sec":2},"status":"publish","excerpt":""},{"id":414,"link":"https:\/\/quatronics.com\/what-is-a-csp-depends\/","name":"what-is-a-csp-depends","thumbnail":{"url":false,"alt":false},"title":"What is a CSP? Depends\u2026","author":{"name":"James Harper","link":"https:\/\/quatronics.com\/author\/james\/"},"date":"Feb 2, 2025","dateGMT":"2025-02-02 22:55:00","modifiedDate":"2025-02-02 22:43:00","modifiedDateGMT":"2025-02-02 22:43:00","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/quatronics.com\/category\/uncategorized\/\" rel=\"category tag\">Uncategorized<\/a>","space":"<a href=\"https:\/\/quatronics.com\/category\/uncategorized\/\" rel=\"category tag\">Uncategorized<\/a>"},"taxonomies":{"post_tag":"<a href='https:\/\/quatronics.com\/tag\/cloud-service-provider\/' rel='post_tag'>Cloud Service Provider<\/a><a href='https:\/\/quatronics.com\/tag\/csp\/' rel='post_tag'>CSP<\/a><a href='https:\/\/quatronics.com\/tag\/nist-wp-800-145\/' rel='post_tag'>NIST WP 800-145<\/a>","series":""},"readTime":{"min":1,"sec":21},"status":"publish","excerpt":""},{"id":416,"link":"https:\/\/quatronics.com\/are-your-google-authenticator-codes-truly-secure\/","name":"are-your-google-authenticator-codes-truly-secure","thumbnail":{"url":false,"alt":false},"title":"Are Your Google Authenticator Codes Truly Secure?","author":{"name":"James Harper","link":"https:\/\/quatronics.com\/author\/james\/"},"date":"Feb 2, 2025","dateGMT":"2025-02-02 22:49:00","modifiedDate":"2025-02-02 22:46:44","modifiedDateGMT":"2025-02-02 22:46:44","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/quatronics.com\/category\/uncategorized\/\" rel=\"category tag\">Uncategorized<\/a>","space":"<a href=\"https:\/\/quatronics.com\/category\/uncategorized\/\" rel=\"category tag\">Uncategorized<\/a>"},"taxonomies":{"post_tag":"<a href='https:\/\/quatronics.com\/tag\/cmmc-2\/' rel='post_tag'>CMMC<\/a><a href='https:\/\/quatronics.com\/tag\/cybersecurity-2\/' rel='post_tag'>Cybersecurity<\/a><a href='https:\/\/quatronics.com\/tag\/googleauthenticator\/' rel='post_tag'>GoogleAuthenticator<\/a><a href='https:\/\/quatronics.com\/tag\/multifactorauthentication\/' rel='post_tag'>MultiFactorAuthentication<\/a><a href='https:\/\/quatronics.com\/tag\/phishingawareness\/' rel='post_tag'>PhishingAwareness<\/a>","series":""},"readTime":{"min":1,"sec":26},"status":"publish","excerpt":""},{"id":410,"link":"https:\/\/quatronics.com\/why-nations-fail-a-book-review\/","name":"why-nations-fail-a-book-review","thumbnail":{"url":false,"alt":false},"title":"Why Nations Fail: A Book Review","author":{"name":"James Harper","link":"https:\/\/quatronics.com\/author\/james\/"},"date":"Feb 2, 2025","dateGMT":"2025-02-02 22:35:08","modifiedDate":"2025-02-02 22:35:19","modifiedDateGMT":"2025-02-02 22:35:19","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/quatronics.com\/category\/uncategorized\/\" rel=\"category tag\">Uncategorized<\/a>","space":"<a href=\"https:\/\/quatronics.com\/category\/uncategorized\/\" rel=\"category tag\">Uncategorized<\/a>"},"taxonomies":{"post_tag":"<a href='https:\/\/quatronics.com\/tag\/acemoglu\/' rel='post_tag'>Acemoglu<\/a><a href='https:\/\/quatronics.com\/tag\/book-review\/' rel='post_tag'>Book Review<\/a><a href='https:\/\/quatronics.com\/tag\/daron-acemoglu\/' rel='post_tag'>Daron Acemoglu<\/a><a href='https:\/\/quatronics.com\/tag\/james-a-robinson\/' rel='post_tag'>James A. Robinson<\/a><a href='https:\/\/quatronics.com\/tag\/why-nations-fail\/' rel='post_tag'>Why Nations Fail<\/a>","series":""},"readTime":{"min":2,"sec":18},"status":"publish","excerpt":""},{"id":408,"link":"https:\/\/quatronics.com\/what-does-a-cmmc-effort-entail\/","name":"what-does-a-cmmc-effort-entail","thumbnail":{"url":false,"alt":false},"title":"What Does a CMMC Effort Entail","author":{"name":"James Harper","link":"https:\/\/quatronics.com\/author\/james\/"},"date":"Feb 2, 2025","dateGMT":"2025-02-02 22:30:46","modifiedDate":"2025-02-02 22:31:21","modifiedDateGMT":"2025-02-02 22:31:21","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/quatronics.com\/category\/uncategorized\/\" rel=\"category tag\">Uncategorized<\/a>","space":"<a href=\"https:\/\/quatronics.com\/category\/uncategorized\/\" rel=\"category tag\">Uncategorized<\/a>"},"taxonomies":{"post_tag":"<a href='https:\/\/quatronics.com\/tag\/c3pao\/' rel='post_tag'>#C3PAO<\/a><a href='https:\/\/quatronics.com\/tag\/cmmc-2\/' rel='post_tag'>CMMC<\/a><a href='https:\/\/quatronics.com\/tag\/compliance-2\/' rel='post_tag'>Compliance<\/a><a href='https:\/\/quatronics.com\/tag\/msp\/' rel='post_tag'>MSP<\/a><a href='https:\/\/quatronics.com\/tag\/mssp\/' rel='post_tag'>MSSP<\/a>","series":""},"readTime":{"min":2,"sec":3},"status":"publish","excerpt":""},{"id":406,"link":"https:\/\/quatronics.com\/maximizing-cmmc-control-inheritance\/","name":"maximizing-cmmc-control-inheritance","thumbnail":{"url":false,"alt":false},"title":"Maximizing CMMC Control Inheritance","author":{"name":"James Harper","link":"https:\/\/quatronics.com\/author\/james\/"},"date":"Feb 2, 2025","dateGMT":"2025-02-02 22:19:39","modifiedDate":"2025-02-02 22:21:26","modifiedDateGMT":"2025-02-02 22:21:26","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/quatronics.com\/category\/cmmc-control\/\" rel=\"category tag\">CMMC Control<\/a>","space":"<a href=\"https:\/\/quatronics.com\/category\/cmmc-control\/\" rel=\"category tag\">CMMC Control<\/a>"},"taxonomies":{"post_tag":"<a href='https:\/\/quatronics.com\/tag\/cmmc-cybersecurity-defenseindustry-govcon-cloudsecurity\/' rel='post_tag'>#CMMC #Cybersecurity #DefenseIndustry #GovCon #CloudSecurity<\/a>","series":""},"readTime":{"min":2,"sec":18},"status":"publish","excerpt":""},{"id":339,"link":"https:\/\/quatronics.com\/phone-fortress-how-to-keep-your-mobile-device-secure\/","name":"phone-fortress-how-to-keep-your-mobile-device-secure","thumbnail":{"url":false,"alt":false},"title":"Phone Fortress: How to Keep Your Mobile Device Secure","author":{"name":"James Harper","link":"https:\/\/quatronics.com\/author\/james\/"},"date":"Dec 25, 2024","dateGMT":"2024-12-25 10:45:52","modifiedDate":"2025-02-02 22:21:37","modifiedDateGMT":"2025-02-02 22:21:37","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/quatronics.com\/category\/call-to-action\/\" rel=\"category tag\">call to action<\/a>, <a href=\"https:\/\/quatronics.com\/category\/general-information\/\" rel=\"category tag\">general information<\/a>, <a href=\"https:\/\/quatronics.com\/category\/updates-in-the-security-field\/\" rel=\"category tag\">updates in the security field<\/a>","space":"<a href=\"https:\/\/quatronics.com\/category\/call-to-action\/\" rel=\"category tag\">call to action<\/a> <a href=\"https:\/\/quatronics.com\/category\/general-information\/\" rel=\"category tag\">general information<\/a> <a href=\"https:\/\/quatronics.com\/category\/updates-in-the-security-field\/\" rel=\"category tag\">updates in the security field<\/a>"},"taxonomies":{"post_tag":"<a href='https:\/\/quatronics.com\/tag\/cybersecurity\/' rel='post_tag'>#Cybersecurity<\/a><a href='https:\/\/quatronics.com\/tag\/itsecurity\/' rel='post_tag'>#ITSecurity<\/a><a href='https:\/\/quatronics.com\/tag\/mobiledevices\/' rel='post_tag'>#MobileDevices<\/a><a href='https:\/\/quatronics.com\/tag\/networksecurity\/' rel='post_tag'>#NetworkSecurity<\/a><a href='https:\/\/quatronics.com\/tag\/wirelesssecurity\/' rel='post_tag'>#WirelessSecurity<\/a>","series":""},"readTime":{"min":0,"sec":53},"status":"publish","excerpt":""},{"id":332,"link":"https:\/\/quatronics.com\/authenticator-security-a-closer-look-at-the-limitations\/","name":"authenticator-security-a-closer-look-at-the-limitations","thumbnail":{"url":false,"alt":false},"title":"Authenticator Security: A Closer Look at the Limitations","author":{"name":"James Harper","link":"https:\/\/quatronics.com\/author\/james\/"},"date":"Dec 24, 2024","dateGMT":"2024-12-24 23:11:44","modifiedDate":"2025-02-02 22:22:23","modifiedDateGMT":"2025-02-02 22:22:23","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/quatronics.com\/category\/call-to-action\/\" rel=\"category tag\">call to action<\/a>, <a href=\"https:\/\/quatronics.com\/category\/general-information\/\" rel=\"category tag\">general information<\/a>, <a href=\"https:\/\/quatronics.com\/category\/specific-requirements\/\" rel=\"category tag\">specific requirements<\/a>, <a href=\"https:\/\/quatronics.com\/category\/updates-in-the-security-field\/\" rel=\"category tag\">updates in the security field<\/a>","space":"<a href=\"https:\/\/quatronics.com\/category\/call-to-action\/\" rel=\"category tag\">call to action<\/a> <a href=\"https:\/\/quatronics.com\/category\/general-information\/\" rel=\"category tag\">general information<\/a> <a href=\"https:\/\/quatronics.com\/category\/specific-requirements\/\" rel=\"category tag\">specific requirements<\/a> <a href=\"https:\/\/quatronics.com\/category\/updates-in-the-security-field\/\" rel=\"category tag\">updates in the security field<\/a>"},"taxonomies":{"post_tag":"<a href='https:\/\/quatronics.com\/tag\/cmmc\/' rel='post_tag'>#CMMC<\/a><a href='https:\/\/quatronics.com\/tag\/compliance\/' rel='post_tag'>#Compliance<\/a><a href='https:\/\/quatronics.com\/tag\/cybersecurity\/' rel='post_tag'>#Cybersecurity<\/a><a href='https:\/\/quatronics.com\/tag\/dodcontracts\/' rel='post_tag'>#DoDContracts<\/a><a href='https:\/\/quatronics.com\/tag\/itsecurity\/' rel='post_tag'>#ITSecurity<\/a><a href='https:\/\/quatronics.com\/tag\/networksecurity\/' rel='post_tag'>#NetworkSecurity<\/a><a href='https:\/\/quatronics.com\/tag\/wirelesssecurity\/' rel='post_tag'>#WirelessSecurity<\/a>","series":""},"readTime":{"min":1,"sec":14},"status":"publish","excerpt":""},{"id":330,"link":"https:\/\/quatronics.com\/act-now-protect-your-phone-from-the-latest-threats\/","name":"act-now-protect-your-phone-from-the-latest-threats","thumbnail":{"url":false,"alt":false},"title":"Act Now: Protect Your Phone From the Latest Threats","author":{"name":"James Harper","link":"https:\/\/quatronics.com\/author\/james\/"},"date":"Dec 20, 2024","dateGMT":"2024-12-20 23:07:53","modifiedDate":"2025-02-02 22:22:38","modifiedDateGMT":"2025-02-02 22:22:38","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/quatronics.com\/category\/call-to-action\/\" rel=\"category tag\">call to action<\/a>, <a href=\"https:\/\/quatronics.com\/category\/general-information\/\" rel=\"category tag\">general information<\/a>, <a href=\"https:\/\/quatronics.com\/category\/updates-in-the-security-field\/\" rel=\"category tag\">updates in the security field<\/a>","space":"<a href=\"https:\/\/quatronics.com\/category\/call-to-action\/\" rel=\"category tag\">call to action<\/a> <a href=\"https:\/\/quatronics.com\/category\/general-information\/\" rel=\"category tag\">general information<\/a> <a href=\"https:\/\/quatronics.com\/category\/updates-in-the-security-field\/\" rel=\"category tag\">updates in the security field<\/a>"},"taxonomies":{"post_tag":"<a href='https:\/\/quatronics.com\/tag\/cybersecurity\/' rel='post_tag'>#Cybersecurity<\/a><a href='https:\/\/quatronics.com\/tag\/itsecurity\/' rel='post_tag'>#ITSecurity<\/a><a href='https:\/\/quatronics.com\/tag\/networksecurity\/' rel='post_tag'>#NetworkSecurity<\/a><a href='https:\/\/quatronics.com\/tag\/wirelesssecurity\/' rel='post_tag'>#WirelessSecurity<\/a>","series":""},"readTime":{"min":0,"sec":52},"status":"publish","excerpt":""},{"id":141,"link":"https:\/\/quatronics.com\/navigating-the-intersection-of-post-quantum-encryption-and-cmmc-compliance-3\/","name":"navigating-the-intersection-of-post-quantum-encryption-and-cmmc-compliance-3","thumbnail":{"url":false,"alt":false},"title":"Navigating the Intersection of Post-Quantum Encryption and CMMC Compliance","author":{"name":"James Harper","link":"https:\/\/quatronics.com\/author\/james\/"},"date":"Dec 18, 2024","dateGMT":"2024-12-18 03:55:14","modifiedDate":"2025-02-02 22:22:44","modifiedDateGMT":"2025-02-02 22:22:44","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/quatronics.com\/category\/uncategorized\/\" rel=\"category tag\">Uncategorized<\/a>","space":"<a href=\"https:\/\/quatronics.com\/category\/uncategorized\/\" rel=\"category tag\">Uncategorized<\/a>"},"taxonomies":{"post_tag":"","series":""},"readTime":{"min":2,"sec":3},"status":"publish","excerpt":""}]