The Cyber Risk of USBs
USBs (as well as CDs, DVDs, etc.) are designed to provide removable storage for a computer. This storage includes both data files (Word documents, videos,
USBs (as well as CDs, DVDs, etc.) are designed to provide removable storage for a computer. This storage includes both data files (Word documents, videos,

Totem Technologies’ Small Business CMMC Preparation Methodology This post describes Totem Technologies’ (Totem.Tech) three-phased approach and methodology to achieve CMMC Certification. We follow this Methodology

What the heck are processes acting on behalf of authorized users? Excellent question, especially since NIST SP 800-171 and CMMC discussion, guidance, examples, and “clarification”
Introduction to and Explanation of the Proposed DFARS Interim Rules In a proposal published in the Federal Register, the DoD has outlined three new DFARS
Introduction to the FAR and DFARS Rules The Federal Acquisition Regulation (FAR) provides a set of guidelines for how the US Federal Government can procure

How to Address the Totem Top 5 Cybersecurity Safeguards in NIST 800-171 and the CMMC Introduction and Revisiting the Top 5 Cybersecurity Safeguards The CMMC
Differences do exist between CMMC and NIST 800-171 It is important to understand the difference between CMMC and NIST 800-171 as certification of DoD contractors’

Version 1.0 of the DoD CMMC is Out! The days of Department of Defense (DoD) contractor cybersecurity self-assessment are coming to an end with the

Your Guide to Controlled Unclassified Information What is CUI, Controlled Unclassified Information, and does every DoD Contractor have to comply with DFARS 252.204-7012 / NIST