
What the heck is the difference between FedRAMP and CMMC?
Between the DoD’s publication of the FedRAMP equivalency memo, the subsequent discussion amongst the CMMC community, and more small businesses providing cloud-based services to the
Between the DoD’s publication of the FedRAMP equivalency memo, the subsequent discussion amongst the CMMC community, and more small businesses providing cloud-based services to the
In this post, we will take a look at a Microsoft 365 feature known as Conditional Access. This curious bit of security access control and
Federal contractors required to implement the cybersecurity controls in NIST SP 800-171 may be confused when addressing safeguards involving the protection of “sessions”, particularly user
UPDATE 20 December 2024: This post is about the proposed CMMC rule, which has now been finalized. Therefore, this post has been superseded by our
What a loaded question. Buckle up, folks… this could get spicy. When looking to meet the Cybersecurity Maturity Model Certification (CMMC) requirements, many Department of
Totem Technologies is thrilled to share the release of our biggest software upgrade to date, Version 5.0 of our Totem™ Cybersecurity Compliance Management tool! Packed
This is the million-dollar question for Defense Industrial Base (DIB) members, isn’t it? Totem has many clients that do not appear to handle (store, process,
Microsoft. When you hear this word, what goes through your mind? Is it joy? Perhaps frustration? Maybe it’s robust features like Azure. What about Azure Virtual
Why I chose Totem Tech I am currently a sophomore attending Brigham Young University (BYU) and a declared cybersecurity major. Early this year, like many
Totem Technologies is the trusted CMMC tooling and training provider for defense contractors and their external service providers.
(385) 492-3405
Copyright © 2025 Totem Technologies, LLC
All rights reserved. Privacy Policy.