Welcome to our blog page, where you can stay up-to-date with all things CMMC and access information and best practices for protecting your organization’s sensitive data.
An Introduction to Redspin & CMMC
Dave Bailey and Rob Teague discuss the key aspects of CMMC certification and how Redspin, as one of the first organizations accredited as a C3PAO for the DoD, can help DIB suppliers meet their requirements.
The Key Roles of Documentation & Training
We explore two critical areas of the assessment process: documentation and training.
How GCC-High & a VDI Environment Can Help Clarify your Scope
How GCC-High and a VDI environment can help organizations meet CMMC requirements by providing a more secure and controlled environment for accessing and managing CUI.
Cloud Service Providers & CMMC: Do they Mix?
CSPs – what they are and how they can assist in achieving an organization’s goals. This blog focuses on CSP requirements related to CMMC and provides key insights and considerations for choosing a CSP that aligns with compliance standards.
FAQs about MSPs
We break down Managed Service Providers and in relation to CMMC, where most companies rely on some form of third-party assistance, whether from a Cloud Service Provider (CSP) or a Managed Service Provider (MSP).
Answers to frequently asked questions about JSVAP assessments, which are used to evaluate the cybersecurity posture of defense contractors. This blog aims to provide readers with a better understanding of JSVAP assessments and their significance by addressing common questions.
The Importance of choosing an LTP for CMMC Training
The Cyber AB’s Licensed Training Provider (LTP) program requires strict qualifications for organizations to become approved providers of CMMC training, with LTPs listed in the CMMC marketplace and trained by Certified CMMC Provisional Instructors (PIs) who have undergone extensive training beyond the Provisional Assessors (PAs), and all PI candidates must pass PA training before taking the PI training.
CMMC Level 2 Bifurcation Rule
Certain changes to the CMMC model caused some controversy, but made sense in the larger picture of cybersecurity, such as the model scaled down from five levels to three.
Securing The Nation's Defense Industrial Base
Get started with Redspin Today
Be Ready. Be Resilient. Validate.