What the heck is FIPS-validated cryptography?
For Department of Defense (DoD) contractors and subcontractors pursuing compliance with the Cybersecurity Maturity Model Certification (CMMC), few controls have been as challenging (and costly)
For Department of Defense (DoD) contractors and subcontractors pursuing compliance with the Cybersecurity Maturity Model Certification (CMMC), few controls have been as challenging (and costly)
As the Department of Defense (DoD) has turned its attention towards the glaring cybersecurity deficiencies within the Defense Industrial Base (DIB), it has established the
Small businesses are the backbone of the United States economy, as they comprise upwards of 99% of all businesses. Given the sheer number of small
Totem Technologies is excited to announce that all software customers have been upgraded to the next major release of our Totem™ Cybersecurity Compliance Management tool,
What is Federal Contract Information (FCI)? If you have a contract to develop or deliver a product or service to the Federal Government, you undoubtedly
Most small business Department of Defense (DoD) contractors do not have the resources to hire a full-time IT staff, which is why we typically look
For the last two years, many Defense Industrial Base (DIB) members have grown accustomed to working remotely. However, with the rapidly approaching Cybersecurity Maturity Model
With the recently announced Cybersecurity Maturity Model Certification (CMMC) version 2.0, many of us within the Defense Industrial Base (DIB) are beginning to turn our
We’ve made the assertion in our Totem Top 10 that, after you have gathered a complete inventory of all your IT system assets and identified
(385) 492-3405
Copyright © 2022 Haight Bey & Associates LLC DBA Totem Technologies.
All rights reserved. Privacy Policy.