What Changes in CMMC from Rev 2 to Rev 3

The CMMC Rev 2 to Rev 3 Memo: What’s Changed?

| | CMMC
The world of cybersecurity is always changing, with rapid evolution in both threat and response creating a continual churn in knowledge, technology, and standards. Frameworks meant to help protect systems and businesses, ...
All About Scoping for CMMC

How to Handle CMMC Scoping for Remote Employees

| | CMMC
CMMC mandates that companies working as part of the government supply line need to comply with a level of security determined by their handling of controlled information. Identifying the level of compliance ...
CMMC vs. NIST: Key Differences Defense Contractors Must Understand

CMMC vs. NIST: Key Differences Defense Contractors Must Understand

| | CMMC, GRC
If you’re a defense contractor, cybersecurity compliance isn’t just a suggestion—it’s a requirement. The U.S. Department of Defense (DoD) has implemented strict cybersecurity guidelines to ensure that sensitive government information stays protected ...
Documentation

CMMC Level 2 Documentation: What Auditors Want to See

| | CMMC
If you’re part of the defense industrial base and you’re seeking CMMC certification, there’s a very good chance you’re aiming for Level 2. Level 1 is mostly meant for businesses with a ...
A Brief History of CMMC

Guide: What is the CMMC-AB (Accreditation Body)?

| | CMMC
Every year that goes by shows an improvement in technology, often by leaps and bounds over previous technology. What used to be the realm of far-off science fiction so unbelievably exotic that ...
CMMC is Here: Simplifying Compliance with Enclaves 

CMMC is Here: Simplifying Compliance with Enclaves 

| | Blog Posts, CMMC, Compliance, DoD, supply chain
A joint blog featuring CISO Global’s Compliance Team & PreVeil The long-anticipated CMMC rule (CFR 32) is now live, marking a crucial turning point for defense contractors. The Compliance Team at CISO ...
What is Included in Microsoft GCCH

Microsoft GCCH vs. Google Public Sector for CMMC

| | CMMC
When it comes to overall productivity platforms, collaboration tools, and office suites, the two biggest options dominating the market are the Google G Suite and Microsoft’s Office ecosystem. Whether it’s word processing, ...
What is a CMMC Auditor

CMMC Auditor vs Assessor (CCA): How the Two Compare

| | CMMC
The full compliance process for CMMC, the Cybersecurity Maturity Model Certification, culminates in an audit that validates an organization’s cybersecurity posture and its implementation of the security controls that apply to it ...
1 Poor Credential Management

The Top 10 Reasons People Fail a CMMC Audit

| | CMMC
The Cybersecurity Maturity Model Certification, version 2.0, is finally in effect, which means thousands of businesses that have roles in the Department of Defense supply line need to do the work to ...
What is a C3PAO

What is a C3PAO? Accreditation, Process, Audits & More

| | CMMC
Cybersecurity is a complex business, and there are numerous standards and frameworks meant to help businesses achieve some level of security and protection in a hostile world. Among those programs is CMMC, ...