What Is CUI And Why Should You Care?

What Is Controlled Unclassified Information (CUI) and Why Should You Care? In today’s digital world, data is everything. But not all data is created equal. Some types of information, while not classified, are still sensitive enough to need protection. That’s where Controlled Unclassified Information (CUI) comes in. If you’re new to cybersecurity or just trying…

Details

DIB Updates June 6, 2025

Important Update: New Cyber Incident Reporting Process for DoD Contractors Effective June 6, 2025 To our valued Defense Industrial Base (DIB) partners, The Department of Defense (DoD) has recently announced a critical update to the cyber incident reporting process for contractors handling Controlled Unclassified Information (CUI) or operating under DFARS clauses 252.204-7012 and 252.239-7010. What’s…

Details

32CFR CMMC 2.0 Released

Document Written on Saturday October 13, 2024, by Humberto Correa, CEO and Founder, RPO, RP, MSP, MSSP of Brea Networks, LLC.   This document provides an overview of the major highlights and changes in the 32 CFR release from October 11, 2024, which is projected to take effect on December 16, 2024. We have outlined and…

Details

CMMC Defined

Who needs CMMC certification?… By 2026, most defense contractors conducting work for the DoD – other than those managing Commercial Off The Shelf (COTS) – will need to achieve CMMC certification. The level of certification you need will depend on the requirements spelled out in your contract. 3 MAIN OBJECTIVES: Companies that have a FAR…

Details

How To Become ITAR Compliant?

  How To Become ITAR Compliant?  Most people within the defense sector know about ITAR. However, not everyone knows how to become ITAR compliant. With that in mind, today we answer some key questions about this important set of regulations. What Is ITAR? ITAR (International Traffic in Arms Regulations) is a set of United States…

Details

Who Administers ITAR?

Who Administers ITAR? When it comes to compliance, knowledge is power, and ITAR is no exception. For example, knowing who administers ITAR can help you better understand how this important compliance regime works. With that in mind, today we delve into the world of ITAR to understand who administers it and why it is essential.…

Details

CMMC Least Privilege

CMMC: What Is the Principle of Least Privilege? The principle of least privilege is one of the cornerstones of most cybersecurity frameworks, and the Cybersecurity Maturity Model Certification (CMMC) is no exception. Keep reading to learn everything about the principle of least privilege: What it is, how to implement it, and what it means for…

Details
Graphic that reads "Examples of ITAR Violations"

What Are Some Examples of ITAR Violations? 

Knowing some instances of what constitutes an infraction to the International Traffic in Arms Regulations goes a long way towards understanding this important regulatory regime. With that in mind, today we review some examples of ITAR violations. Some are obvious, while others demonstrate how easily companies can incur potential ITAR violations if they don’t have…

Details