Shadow Person holding a card

Wait, Who are You?

The veritable explosion of teleworking, remote-work, and work-from-home situations due to everything from the pandemic to (like me) just being tired of the commute, abstracts identity authenticity further; trust has become, or should be considered, very tenuous.

Picture of a Zamboni

The CMMC Zamboni

Securing the Defense Industrial Base The Cybersecurity Maturity Model Certification (CMMC) requires U.S. Department of Defense (DoD) contractors, sub-contractors, and suppliers to adopt information technology

Preparing for CMMC

Last month, the U.S. Office of the Under Secretary of Defense for Acquisition and Sustainment released draft version 0.6 of the Cybersecurity Maturity Model Certification

Cybersecurity Maturity Model Certification

The U.S. Department of Defense continues it’s push to strengthen the security of the Defense Industrial Base and the critical information contained therein. Businesses either

Multifactor Authentication – Raising the Bar

Organizations doing business with the U.S. Government, or planning to do so, must consider the potential for increased cybersecurity requirements. Contracts that include the creation,

Business Operating Policies Enable Compliance

Compliance with the security controls described in NIST SP 800-171 Revision 1 and DFARS Clause 252.204-7012 is required for organizations doing business with the U.S. Federal Government that involves

VPN for Business is more than just a VPN

For small businesses involved in contracts with the Federal Government or Department of Defense, compliance with security requirements for the protection of controlled unclassified information

Search our Blog
Categories
Subscribe to our Newsletter
We’ve got a lot of good info to share! Sign up for the Assured Bridge newsletter and receive tips on how to remain compliant with Federal CUI standards.