Test text
“Id diam maecenas ultricies mi. Vitae suscipit tellus mauris a diam. Non pulvinar neque laoreet suspendisse interdum. Vestibulum lectus mauris ultrices eros in cursus turpis.”
“It’s easy to scale, and the time to value is great. It only took us a month to get what manually took us eight months.”
Introduction
On November 4, 2021, the Department of Defense (DoD) released the much-anticipated updates to the Cybersecurity Maturity Model Certification (CMMC), dubbed “CMMC 2.0”, following a comprehensive review of over 850 public comments in response to the interim rule establishing CMMC 1.0. The updates simplify the program and reduce it in both scope and expectations, making it easier to understand and more feasible for contractors.
While the simplifications may be welcome, the updates are also confirmation that the requirement for contractors to comply with CMMC is fast approaching. The DoD has indicated
The Department of Defense has released CMMC 2.0, introducing several new updates. Here are the six key takeaways contractors need to know
Getting CMMC certified takes time and preparation. This guide covers the five practical steps to go from zero to certified
This comprehensive guide covers everything you need to know about the NIST 800-171 Basic Assessment and the steps you can take to build a compliance process.
Scoping FCI & CUI is a necessary step to make NIST 800-171 & CMMC compliance more feasible and cost-effective. Read the Complete Scoping Guide.
This complete CMMC guide will review everything contractors need to know about CMMC, including its structure, requirements, and certification process.
SaltyCloud attended the 2022 EDUCAUSE Cybersecurity and Privacy Professionals Conference (CPPC and did a lot. These are our highlights
TX-RAMP is a new vendor risk management regulation for Texas state agencies and public higher education institutions. Here’s everything agencies need to know
The Department of Defense has released CMMC 2.0, introducing several new updates. Here are the six key takeaways contractors need to know
Learn how to establish a successful vendor risk management (VRM) program at a higher education institution using the Higher Education Cloud Vendor Assessment Toolkit (HECVAT) with our practical guide
The Department of Education Federal Student Aid Office (FSA) has announced its Campus Cybersecurity Program for Title IV Higher Education Insitutions
The DFARS Interim Rule came into effect on September 29, 2020, and it affects Higher Education Institutions that conduct DoD-sponsored research
Learn everything you need to know about the GLBA in Higher Education with our comprehensive blog post
Conducting a GLBA Pre-Audit Assessment will serve as evidence for your auditors and a guide for your institution
IT Risk Assessments are a critical component of any mature security program. Learn how to conduct your own with this quick guide.
Regulations can help direct our efforts to where work might need to be done, but risk assessments give us advance notice of exactly where those gaps might be. Using a variety of applicable regulatory frameworks, anyone can shore up their compliance through the use of questionnaire-based risk assessments.
For anyone in the medical field, HIPAA sets the standards for the use and protection of medical information and impacts every organization across the healthcare ecosystem, whether interacting with patients or not. As if the threat (and reality) of breaches wasn’t enough, the regulators behind HIPAA mean business when it comes to compliance.
Executing a risk assessment and protecting sensitive consumer information under the New York State Department of Financial Services (NYDFS) cybersecurity regulations
As you start to focus on the issues discovered during a cybersecurity risk assessment, figuring out how to address them can prove difficult. However, there are a few strategies that can help
Using spreadsheets to conduct a risk assessment can be a powerful tool, but they have their limitations.
In-house and outsourced IT risk assessments both have their advantages and disadvantages. Depending on your institution’s needs, it is important to explore different arrangements
Justifying even a modest, incremental budget for a security program can be challenging. A few checklist key tactics can help you make a difference when convincing your key stakeholders
A security risk assessment is a daunting task for any security team. This article will uncover the five biggest problems that they face Blog testing
Test Post
Choosing a Vendor Risk Management Framework—Top 3 Compared
CMMC 2.0 is Here: 6 Key Updates
The 5-Step Guide to Prepare for the CMMC
NIST 800-171 Basic Assessment – Complete Guide
Scoping FCI & CUI for NIST 800-171 & CMMC – Complete Guide
Everything about the CMMC – Complete CMMC Guide
EDUCAUSE CPPC 2022 Highlights
Everything about TX-RAMP
CMMC 2.0 is Here: 6 Key Updates
Establishing a VRM Program with the HECVAT
Understanding the Campus Cybersecurity Program by the Department of Education
DFARS Interim Rule & Higher Education
Everything about the GLBA in Higher Education
Conducting the GLBA Pre-Audit Assessment
Conducting IT Risk Assessments Quick Guide
Higher Education Regulations Quick Guide
HIPAA Compliance Guide
NYDFS: Achieving the New Risk Assessment Requirement
IT Risk Assessments: Prioritizing Risks
IT Risk Assessments: Spreadsheets vs. Workflow Software
In-House vs. Outsourced IT Risk Assessments
How to Get Budget for an IT Risk Assessment
The Top 5 Problems Security Teams Face During Cybersecurity Risk Assessments