CMMC Mandate to Enhance Cybersecurity is Clear

CMMC Mandate to Enhance Cybersecurity is Clear

|
The need to defend against cyberattacks that threaten U.S. advantages in the military is becoming more and more obvious every day. The Department of Defense (DoD) is intent on better defending the vast attack surface that the Defense Industrial Base (DIB) presents to adversaries and is taking action to do ... Read More
A Zero Trust Model for Securing Communications and Collaboration

A Zero Trust Model for Securing Communications and Collaboration

|
President’s Biden’s May 2021 Executive Order on Improving the Nation’s Cybersecurity mandates rapid development of plans by every federal agency for modernizing their approach to cybersecurity. One of the most crucial improvements called for is the implementation of Zero Trust Architecture.   The Executive Order (EO) makes clear that Zero ... Read More

Password attacks on Microsoft highlight the need for Passwordless Zero Trust Systems

|
Nobelium, the hackers behind the SolarWinds hack, have struck again. The hacking group, linked to Russia’s Foreign Intelligence Service by U.S. authorities, attacked Microsoft customer support systems. They installed malicious information-stealing software into Microsoft’s systems and then used that stolen data to attack Microsoft customers. While Microsoft reports that most ... Read More
Zero Trust is the Only Way: President Biden’s Executive Order Simplified

Zero Trust is the Only Way: President Biden’s Executive Order Simplified

|
President Biden’s May 12 Executive Order made into policy what the NSA and leading cyber experts have long been advocating. Zero trust is the fundamental cybersecurity principle for combatting sophisticated cyber attacks.   “The prevention, detection, assessment, and remediation of cyber incidents is a top priority and essential to national ... Read More
How a defense contractor got a near perfect NIST 800-171 score: 7 important questions and answers

How a defense contractor got a near perfect NIST 800-171 score: 7 important questions and answers

|
PreVeil’s recent webinar with our friend Jose Neto of PC Warriors covered how a small defense contractor achieved a near perfect score on a NIST 800-171 DIBCAC audit. The webinar, led by our cofounder Sanjeev Verma, focused on how Dr. Neto was able to advise and lead the defense contractor ... Read More
10 Most Common CMMC Compliance Questions

10 Most Common CMMC Compliance Questions

|
Every day, questions arise on how contractors can facilitate their path to CMMC compliance. Our sales team hears these questions as well. Here are the 10 questions they get asked most frequently along with answers vetted by our compliance team. Question 1: If a DoD contractor handles CUI, does every ... Read More
Six things you have to know about ITAR compliance

Six things you have to know about ITAR compliance

|
Defense spending in the United States is projected to reach $886 billion by 2025, making it a high growth industry for manufacturers interested in expanding their clientele. To expand into defense, organizations must meet stringent regulations, including International Traffic in Arms Regulations (ITAR). Failure to do so can result in ... Read More
Zero Trust Security for CMMC Compliance

Zero Trust Security for CMMC Compliance

|
Cybervulnerabilities are present and they will only get worse before they improve.   That was Glenn Gerstell’s focal point in yesterday’s PreVeil webinar: Getting to Zero Trust: A New Mindset for CMMC Security moderated by PreVeil’s co-founder Sanjeev Verma. The webinar highlighted the fundamental point of Zero Trust security: eliminate ... Read More

6 Myths About Storing and Protecting CUI

|
Guidance for safeguarding Controlled Unclassified Information Providing secure storage and sharing of CUI is key to meeting the DFARS , NIST and upcoming CMMC requirements. And while the Defense Industrial Base is responsible for protecting its own CUI, the DIB isn’t always given the right answers on how to achieve ... Read More
End-to-End Encryption (Enterprise)

End-to-End Encryption: The Ultimate Guide to How it Works

|
In recent years, the hidden costs of the convenience we get from Big Tech have become increasingly apparent. From Google’s shady data mining practices to Peeping Toms in our inboxes, it’s clear that it’s up to consumers and businesses to protect ourselves from overreaching Big Tech.   Today, many popular ... Read More