What the heck are “sessions” in NIST 800-171?
Federal contractors required to implement the cybersecurity controls in NIST SP 800-171 may be confused when addressing safeguards involving the protection of “sessions”, particularly user
Federal contractors required to implement the cybersecurity controls in NIST SP 800-171 may be confused when addressing safeguards involving the protection of “sessions”, particularly user
What a loaded question. Buckle up, folks… this could get spicy. When looking to meet the Cybersecurity Maturity Model Certification (CMMC) requirements, many Department of
Totem Technologies is thrilled to share the release of our biggest software upgrade to date, Version 5.0 of our Totem™ Cybersecurity Compliance Management tool! Packed
This is the million-dollar question for Defense Industrial Base (DIB) members, isn’t it? Totem has many clients that do not appear to handle (store, process,
Microsoft. When you hear this word, what goes through your mind? Is it joy? Perhaps frustration? Maybe it’s robust features like Azure. What about Azure Virtual
US Department of Defense (DoD) contractors that handle Controlled Unclassified Information (CUI) are required to secure that CUI by implementing the National Institutes of Standards
[Updated October 2023] As the Department of Defense (DoD) has turned its attention towards the glaring cybersecurity deficiencies within the Defense Industrial Base (DIB), it
In continuation of our “What the heck?” series, we explore another NIST 800-171 control that has resulted in confusion for DoD contractors pursuing CMMC compliance.
The Defense Industrial Base (DIB), the supply chain that supports the U.S. Department of Defense (DoD), is often the target of cyberattacks. In an effort
(385) 492-3405
Copyright © 2024 Totem Technologies, LLC
All rights reserved. Privacy Policy.