All Articles
Brenda Harper • 12 Feb 2025
Understanding FedRAMP® and FIPS 140-2
CMMC compliance requires use of FedRAMP® Moderate authorized services and FIPS 140-2 encryption in many situations. But what does that...
Brenda Harper • 5 Feb 2025
System Security Plan: A Roadman to CMMC Compliance
Navigating CMMC compliance requirements can feel overwhelming—especially for small to medium-sized defense contractors. One of the most critical and misunderstood...
Brenda Harper • 31 Jan 2025
Maximizing CMMC Control Inheritance
Maximizing CMMC Control Inheritance When organizations implement a CMMC compliance program, one of the most powerful tools for reducing cost...
Brenda Harper • 27 Jan 2025
CMMC and ISO 9001 Synergies
What does compliance with CMMC or other cybersecurity requirements have to do with ISO 9001? A lot. Compliance with CMMC...
Brenda Harper • 20 Jan 2025
Getting Started in CMMC – Major Players
What Does a CMMC Certification Effort Entail? Joe Spritzer’s construction company would like to start doing business with the DoD....
Brenda Harper • 8 Jan 2025
What is a CSP? Depends….
While most of us understand cloud services through the common NIST definition, the Cybersecurity Maturity Model Certification (CMMC) takes a...
Brenda Harper • 24 Dec 2024
Are Your Google Authenticator Codes Truly Secure?
Many of us trust Google Authenticator to add a layer of security to our accounts. But, Google Authenticator has a...
Brenda Harper • 17 Dec 2024
What are Passkeys?
Passkeys: The Future of Secure and Simple Authentication Passkeys offer a passwordless way to authenticate users. They rely on public-key...
Brenda Harper • 11 Dec 2024
When Security Falls Apart: A Tale of SMS-Based MFA Gone ...
Meet Pete, a hardworking professional at Quantum Naval Solutions. Like many of us, he uses a memorable password, “Sunshine123,” across...