Graphic that reads "CUI vs FCI."

CUI vs FCI: What Is the Difference? 

While Controlled Unclassified Information (CUI) tends to get all the attention, the Cybersecurity Maturity Model Certification (CMMC) also aims to protect Federal Contract Information (FCI). Read on to learn more about FCI and CUI, including their differences and how to safeguard them according to CMMC.   What Is FCI? The term Federal Contract Information refers to…

Graphic that reads "What Are ITAR and EAR?"

What Are ITAR and EAR? 

ITAR and EAR are two sets of regulations with similar purposes. However, there are also some important differences between them. Keep reading to learn more about ITAR and EAR, including a detailed review of their scope and application.  What Is ITAR? The International Traffic in Arms Regulations (or  ITAR)  is a set of controls administered…

Graphic that reads "Can you self-certify CMMC?"

Can You Self-Certify CMMC? 

The Cybersecurity Maturity Model Certification can be a stressful topic for defense contractors. That’s why many of them wonder whether they can self-certify CMMC. In today’s post, we offer a clear, detailed overview of CMMC and self-certification. Keep reading to learn more.  Certifications Under CMMC Let’s begin by answering the question raised in the title…

Graphic that reads "CUI & Foreign Nationals"

Can CUI Be Shared With Foreign Nationals? 

As we have seen in previous posts, ITAR data cannot be shared with foreign nationals. But what about Controlled Unclassified Information (CUI), the main object of the Cybersecurity Maturity Model Certification (CMMC)? In today’s post, we discuss everything you need to know about CUI and foreign nationals. Keep reading to learn more.   What Is Controlled…

Graphic that reads "What Is a RPO in CMMC?"

What Is a CMMC RPO? 

When it comes to the Cybersecurity Maturity Model Certification (CMMC), there are many terms you need to be aware of. One of those acronyms is RPO or Registered Provider Organization. Keep reading to take a closer look at this important part of the CMMC ecosystem.  About Registered Provider Organizations (RPOs) Before we delve into the…

CMMC and FISMA 

You probably understand that FISMA is a piece of legislation that defines cybersecurity standards throughout the federal government. But what is FISMA, exactly, and ( what is its relationship with CMMC? Read on to discover the answers to these questions.  About CMMC The Cybersecurity Maturity Model Certification is a framework developed by the Department of…

Graphic that reads "DFARS 7012: How to Submit Your SPRS Score by Email "

DFARS 7012: How to Submit Your SPRS Score by Email 

Defense contractors need to self-assess their compliance with NIST SP 800-171 into the Supply Performance Risk System (SPRS). However, some contractors experience difficulties gaining access to the system through the Procurement Integrated Enterprise Environment (PIIE). If that’s your case, we have good news: you can also submit your SPRS score via email. In today’s post,…

Graphic that reads "CMMC and Background Checks"

Does CMMC Require Background Checks? 

You may think of the Cybersecurity Maturity Model Certification (CMMC) as a framework that deals exclusively with the technical side of cybersecurity. However, the human factor also plays a role in IT. So, does CMMC require background checks? Keep reading to find out.  What Is CMMC? The Cybersecurity Maturity Model Certification is a three-level model…

Graphic with map reads "ITAR Countries? "

What Are ITAR Countries? 

If you are part of the defense industry in any capacity, chances are good that you have read or heard the term “ITAR Countries.” But what are they, exactly? In today’s post, we explore this essential component of ITAR compliance.  A Quick Introduction to ITAR The International Traffic in Arms Regulation (ITAR) is a United…