U.S. soldiers seen walking against the morning sky illustrate blog "Can You Email ITAR Data? "

Can You Email ITAR Data? 

When it comes to ITAR, questions are never in short supply among contractors. For example, one of the most common is “Can I email ITAR data?” In today’s blog, we provide an answer.  What Is ITAR Data and Why Is It Important? The International Traffic in Arms Regulations (ITAR) controls the export and import of…

U.S soldier using binoculars illustrates blog "CMMC vs. FedRAMP: What Is the Difference? "

CMMC vs. FedRAMP: What Is the Difference? 

CMMC and FedRamp are two of the compliance regimes every Defense contractor needs to be familiar with. In today’s post, we take a detailed look at the difference in scope, characteristics, and goals between these two frameworks. Keep reading to learn more.  What Is CMMC? CMMC stands for Cybersecurity Maturity Model Certification, a three-tier cybersecurity…

U.S. Fighter jet illustrates blog "What CMMC Level Do I Need?"

What CMMC Level Do I Need? 

While Defense contractors have a lot of questions about the Cybersecurity Maturity Model Certification, “What CMMC level do I need?” Is at the top of the list. With that in mind, today we answer this question and provide some tips on how to achieve CMMC Compliance.  How Many CMMC Levels Are There? Let’s start with…

Three Thunderbird military planes painted red, white, and blue illustrate blog "ITAR: Who Is a U.S. Person?"

ITAR: Who Is a U.S. Person? 

The main goal of the International Traffic in Arms Regulations (ITAR) is to control the export of military and defense technology. And while this seems straightforward enough, things get a bit more complex when you take a closer look. For example: who is a U.S. person under ITAR? In today’s blog post, we give you…

What Are CMMC Controls? 

If you are familiarizing yourself with the Cybersecurity Maturity Model Certification, chances are good that you have heard or read the term “CMMC Controls.” However, the official CMMC model doesn’t mention controls. So, what are CMMC controls, exactly? In today’s blog, we tell you everything you need to know.  About CMMC Controls  At its core,…

Soldiers with helmets and headsets pointing at screen illustrate blog "CMMC for Small Businesses: a Starter Kit"

CMMC for Small Businesses: a Starter Kit 

Achieving compliance with the Cybersecurity Maturity Model Certification program can feel daunting, especially if you are a small business without the budget of a huge corporation. That’s why we’ve put together this quick CMMC guide designed with the needs of SMBs in mind.  Here you’ll find everything you need to know explained in simple terms,…

Three soldiers, one holding clipboard and another holding phone receiver illustrate blog "Is ITAR Data CUI?"

Is ITAR Data CUI?

In the alphabet soup of acronyms you need to be familiar with as a defense contractor, two terms stand out: Controlled Unclassified Information (CUI) and International Traffic in Arms Regulations (ITAR). Is ITAR data always CUI? What about the opposite? Keep reading to discover the answers to these questions. What Is CUI? Controlled Unclassified Information,…

Photo of soldier looking at computer screen illustrates blog "What Is Controlled Unclassified Information (CUI), exactly? "

What Is Controlled Unclassified Information (CUI), Exactly? 

Anyone familiar with the Cybersecurity Maturity Model Certification (CMMC) knows that one of the main goals of CMMC is to protect Controlled Unclassified Information. But what is CUI, exactly? In today’s post, we give you the inside scoop.  A Definition of Controlled Unclassified Information (CUI) The United States government defines Controlled Unclassified Information as “Government-created…