Microsoft 365 Conditional Access and CMMC
In this post, we will take a look at a Microsoft 365 feature known as Conditional Access. This curious bit of security access control and
In this post, we will take a look at a Microsoft 365 feature known as Conditional Access. This curious bit of security access control and
UPDATE 20 December 2024: This post is about the proposed CMMC rule, which has now been finalized. Therefore, this post has been superseded by our
Totem Technologies is thrilled to share the release of our biggest software upgrade to date, Version 5.0 of our Totem™ Cybersecurity Compliance Management tool! Packed
Why I chose Totem Tech I am currently a sophomore attending Brigham Young University (BYU) and a declared cybersecurity major. Early this year, like many
Background for FAR and NDAA Section 889 After several years of growing security concerns raised by U.S. Government officials regarding five Chinese companies that provide
[Updated October 2023] As the Department of Defense (DoD) has turned its attention towards the glaring cybersecurity deficiencies within the Defense Industrial Base (DIB), it
It’s well-known that the road is long and challenging for Department of Defense (DoD) contractors pursuing a Cybersecurity Maturity Model Certification (CMMC), and especially so
The interactive graphic below depicts Totem Tech’s “roadmap” to CMMC compliance, showing major milestones to achieving and maintaining Cybersecurity Maturity Model Certification (CMMC) Level 2*
The Challenge of DoD CUI Identification Members of the US Department of Defense (DoD) Industrial Base (DIB)–the prime- and sub-contractors, suppliers, and vendors that comprise