Blog

Blog

NIST SP 800-171 Revision 3: What It Means and How Defense Contractors Can Prepare

These days, defense contractors need to stay nimble where compliance is concerned. As technological threats advance, the need for clarity, specificity, and simplicity increases, leading to changes in the regulations that govern contractor cybersecurity. A recently released US Department of Defense (DoD) memo has spurred rumblings that the underlying NIST framework on which the DoD-mandated CMMC ...
Blog

Cybersecurity Regulatory Landscape in Switzerland: A Primer for Business 

Switzerland is famous for being neutral, discreet, and self-contained. And while that reputation holds in the digital world, too, in the immortal words of Bob Dylan, “the times they are a changin.” To stay in business, even Switzerland must meet data privacy standards set outside of its borders. Cyber threats are growing in volume and sophistication, and regulations need to adapt accordingly. For...
Blog

The Impact of CMMC 3.0 on Government Contractors

With 55% of government contractors expecting their next job to include a CMMC requirement, adhering to the latest, most updated version of “CMMC 3.0" is imperative. According to a recent US Department of Defense (DoD) memo, such an update may be on the horizon.Here are the facts, and what they could mean for certification hopefuls.What is CMMC 3.0?First, let’s get a few things straight. The CMMC 2...
Blog

Preparing for a CMMC Audit: A Practical Guide for Success

Discover what a CMMC audit involves, how it ensures compliance for defense contractors, and how it differs from other cybersecurity audits.
Blog

Strengthening Federal Cybersecurity: End-to-End Solutions for Government Agencies

Over the next year, domestic and foreign adversaries almost certainly will continue to threaten the integrity of US critical infrastructure,” states the Homeland Threat Assessment 2025. “We are particularly concerned about the credible threat from nation-state cyber actors to US critical infrastructure.” In light of these and other severe threats to U.S. federal agencies, the issue of federal...
Blog

What Is CUI Specified? Key Differences Explained

CUI Specified is info needing protection or control under specific laws, regulations, or government-wide policies.
Blog

What Is CUI Basic? Guidelines and Security Measures

Controlled Unclassified Information (CUI) is a sensitive data category that the United States federal government produces or interacts with.
Blog

What Is the NIST Risk Management Framework (RMF)?

The NIST Risk Management Framework, or RMF, is a voluntary 7-step process used to manage information security and privacy risks. By following the NIST RMF, organizations can successfully implement their own risk management programs, maintain compliance, and address the weaknesses that present the greatest danger to their enterprise.
Blog

Understanding The White House’s 2024 Cybersecurity Report

To protect against mounting threats to national security via nation-state cyberattacks, domestic ransomware attacks, and threats to critical infrastructure, The White House issued its 2023 National Cybersecurity Strategy. This recently released 2024 report reviews progress made towards achieving those outlined objectives.
Blog

Government Supply Chain Cybersecurity

Government agencies are a huge target for attackers, and with a hyper-distrubuted supply chain, they are easier to access than ever. Discover what it takes to keep your public sector supply chain safe and how Fortra can help.
Blog

What Is the Federal Risk and Authorization Management Program (FedRAMP)?

An Introduction to FedRAMPIn late 2011, the Office of Management and Budget under the Obama Administration released a memorandum that introduced the Federal Risk and Authorization Management Program (FedRAMP), noting that “[in the two years prior], the Administration worked in close collaboration with the National Institute of Standards and Technology...
Blog

What Customers Are Saying About Intermapper

Intermapper's network monitoring and mapping technology is a perfect fit for customers that need to safeguard critical networks and systems. Check out these what real customers have to say about their experiences with Intermapper.