Blog

Welcome to our blog page, where you can stay up-to-date with all things CMMC and access information and best practices for protecting your organization’s sensitive data.

Home E Resource Center E Blog ( Page 3 )
FAQs about MSPs
FAQs about MSPs

We break down Managed Service Providers and in relation to CMMC, where most companies rely on some form of third-party assistance, whether from a Cloud Service Provider (CSP) or a Managed Service Provider (MSP).

JSAVP Assessments
JSAVP Assessments

Answers to frequently asked questions about JSVAP assessments, which are used to evaluate the cybersecurity posture of defense contractors. This blog aims to provide readers with a better understanding of JSVAP assessments and their significance by addressing common questions.

The Importance of choosing an LTP for CMMC Training
The Importance of choosing an LTP for CMMC Training

The Cyber AB’s Licensed Training Provider (LTP) program requires strict qualifications for organizations to become approved providers of CMMC training, with LTPs listed in the CMMC marketplace and trained by Certified CMMC Provisional Instructors (PIs) who have undergone extensive training beyond the Provisional Assessors (PAs), and all PI candidates must pass PA training before taking the PI training.

CMMC Level 2 Bifurcation Rule
CMMC Level 2 Bifurcation Rule

Certain changes to the CMMC model caused some controversy, but made sense in the larger picture of cybersecurity, such as the model scaled down from five levels to three.

Securing The Nation's Defense Industrial Base

Get started with Redspin Today

Helping you navigate CMMC.