How To Become ITAR Compliant?

  How To Become ITAR Compliant?  Most people within the defense sector know about ITAR. However, not everyone knows how to become ITAR compliant. With that in mind, today we answer some key questions about this important set of regulations. What Is ITAR? ITAR (International Traffic in Arms Regulations) is a set of United States…

Who Administers ITAR?

Who Administers ITAR? When it comes to compliance, knowledge is power, and ITAR is no exception. For example, knowing who administers ITAR can help you better understand how this important compliance regime works. With that in mind, today we delve into the world of ITAR to understand who administers it and why it is essential.…

CMMC Least Privilege

CMMC: What Is the Principle of Least Privilege? The principle of least privilege is one of the cornerstones of most cybersecurity frameworks, and the Cybersecurity Maturity Model Certification (CMMC) is no exception. Keep reading to learn everything about the principle of least privilege: What it is, how to implement it, and what it means for…

Graphic that reads "Examples of ITAR Violations"

What Are Some Examples of ITAR Violations? 

Knowing some instances of what constitutes an infraction to the International Traffic in Arms Regulations goes a long way towards understanding this important regulatory regime. With that in mind, today we review some examples of ITAR violations. Some are obvious, while others demonstrate how easily companies can incur potential ITAR violations if they don’t have…

Graphic that reads "What Are CMMC Domains?"

How Many CMMC Domains Are There? 

“Domain” is a term you come across often when researching the Cybersecurity Maturity Model Certification (CMMC). But what are CMMC domains, exactly? In today’s post, we tell you everything you need to know about this crucial component of the CMMC ecosystem.   A Definition of CMMC Domains Cybersecurity Maturity Model Certification (CMMC) domains are groups or…

Graphic that reads "CMMC Practice AC.L1-3.1.1"

CMMC Practice AC.L1-3.1.1: What You Need To Know 

Regardless of the Cybersecurity Maturity Model Certification (CMMC) level you need to achieve, there are some practices you need to observe. One of these practices is AC.L1-3.1.1, Authorized Access Control. Keep reading to learn more.  What Is AC.L1-3.1.1? Let’s start by making sense of the different components of the CMMC practice number:  AC indicates that…