Earlier this month, the Department of Defense (DOD) released the new Cybersecurity Maturity Model Certification (CMMC) 2.0 framework, along with the self-assessment guides for the new Levels 1 and 2, scoping guidance for all...more
With almost daily news of top firms impacted by data breaches or ransomware attacks, there is no doubt that effective cybersecurity and data privacy are essential to any business. And small businesses are not immune....more
9/14/2021
/ Cyber Attacks ,
Cyber Crimes ,
Cyber Threats ,
Cybersecurity ,
Data Breach ,
Data Privacy ,
Data Protection ,
Data Security ,
Hackers ,
Incident Response Plans ,
Passwords ,
Ransomware ,
Small Business
With almost daily news of top firms impacted by data breaches or ransomware attacks, there is no doubt that effective cybersecurity and data privacy are essential to any business. And small businesses are not immune....more
8/11/2021
/ Cyber Attacks ,
Cyber Crimes ,
Cyber Threats ,
Cybersecurity ,
Data Breach ,
Data Privacy ,
Data Protection ,
Data Security ,
Hackers ,
Incident Response Plans ,
Passwords ,
Popular ,
Ransomware ,
Small Business ,
Webinars
On May 12, 2021, the Biden administration released a far-reaching executive order intended to improve the U.S. government’s cybersecurity posture, both internally and in any private information technology (IT) systems that...more
5/17/2021
/ Biden Administration ,
Cybersecurity ,
Data Breach ,
Data Privacy ,
Data Protection ,
Data Security ,
Executive Orders ,
Hackers ,
National Security ,
Personally Identifiable Information ,
Popular
2020 was a year of upheaval for the cybersecurity and data privacy space. COVID-19 raised new challenges, unprecedented cyberattacks highlighted vulnerabilities in both the private and public sectors, and sweeping new privacy...more
2020 was a year of upheaval for the cybersecurity and data privacy space. COVID-19 raised new challenges, unprecedented cyberattacks highlighted vulnerabilities in both the private and public sectors, and sweeping new privacy...more
Section 889(a)(1)(B) of the NDAA for Fiscal Year 2019 is now in effect. This section of the NDAA prohibits government agencies and government contractors they work with from using certain covered telecommunications equipment...more
8/21/2020
/ China ,
Cybersecurity ,
Data Privacy ,
Federal Contractors ,
Goods or Services ,
Government Agencies ,
NDAA ,
New Rules ,
Procurement Guidelines ,
Supply Chain ,
Technology Sector ,
Telecommunications ,
Waivers
Section 889(a)(1)(B) of the NDAA for Fiscal Year 2019 is now in effect. This section of the NDAA prohibits government agencies and government contractors they work with from using certain covered telecommunications equipment...more
8/20/2020
/ China ,
Cybersecurity ,
Data Privacy ,
Federal Contractors ,
Goods or Services ,
Government Agencies ,
NDAA ,
New Rules ,
Procurement Guidelines ,
Supply Chain ,
Technology Sector ,
Telecommunications ,
Waivers ,
Webinars
Now that DOD has released the final version of the Cybersecurity Maturity Model Certification (CMMC) guidelines, all contractors that work directly or indirectly on Department of Defense (DOD) contracts should be preparing to...more
3/3/2020
/ Acquisitions ,
Bid Protests ,
Certification Requirements ,
Cybersecurity ,
Cybersecurity Maturity Model Certification (CMMC) ,
Data Privacy ,
Data Protection ,
Data Security ,
Defense Contracts ,
Department of Defense (DOD) ,
Due Diligence ,
Federal Contractors ,
Information Technology ,
Joint Venture ,
Mentor-Protege Program ,
Mergers ,
Policies and Procedures ,
Subcontractors ,
Webinars
PilieroMazza previously blogged at length regarding the draft releases of the Cybersecurity Maturity Model Certification (CMMC) guidelines in anticipation of its final release. The Department of Defense (DOD) released the...more