CMMC: Recommendations to navigate the new Cyber Certification requirements

1 minute read

Join Cyber Armed, ID.me, Intercede, and Yubico for a roundtable on key recommendations to navigate and get started with Cybersecurity Maturity Model Certification (CMMC).

Share this article:

Recommended content

Portable root of trust for government

The YubiKey is a portable root for remote workers, non PIV/CAC eligible workers, mobile/BYOD, and shared devices/workstations.

How the YubiKey Helps Department of Defense Contractors Meet the Cybersecurity Maturity Model Certification

The CMMC is the Department of Defense’s unified standard for implementing cybersecurity.

Sentry with YubiKeys

Security and compliance—a top priority for Sentry

Organizations that outsource certain business functions to Software-as-a-Service (SaaS) providers enjoy many benefits, including cost efficiency and increased productivity. However, despite the advantages, there also comes the potential risks of privacy and data compromise. Due to the nature of cloud computing, SaaS providers are required to take necessary steps and precautions to prove the security, ...

authlite ecosystem showcase

The key to DFARS/NIST Compliance

There are only 8 weeks left before the Defense Federal Acquisition Regulation Supplement (DFARS) deadline, and now is the right time for US government contractors to secure Active Directory users. DFARS compliance was structured to protect unclassified US Department of Defense (DoD) information on a contractor’s internal information system from cyber incidents, and to minimize ...