Search Results for: NIST

What DoD contractors need to know when it comes to DFARS and cloud computing

A final rule that amends a section of the Defense Federal Acquisition Regulation Supplement (DFARS) was published by the Department of Defense on Oct. 21 and holds specific regulations for contractors providing cloud services or operating an IT system on behalf of DoD. The final rule is titled “Defense Federal Acquisition Regulation Supplement: Network Penetration… Read more »

Achieve DFARS 7012 Compliance Efficiently and at Net Zero Cost

First-Of-Its-Kind DFARS Offering Allows Any-Size Government Contractor to Achieve DFARS 7012 Compliance Efficiently and at Net Zero Cost With more than 100,000 cyber attacks on Department of Defense (DoD) networks a day, it’s critical for contractors to safeguard information and report cyber attacks. That’s why Sera-Brynn, a Virginia-based global cybersecurity auditor, has teamed with leading… Read more »

Key Information About DFARS Regulations

By Heather Engel, Sera-Brynn, Executive Vice President  This article is the sixth in a series about DFARS. December 2017 seems like a long way off. It’s not. While that’s the deadline imposed by the Department of Defense (DoD) to comply with new contractor regulations regarding safeguarding information, we recommend considering the Gen. George Patton approach:… Read more »

DFARS 252.204-7012 to Safeguard Covered Defense Information

By Heather Engel, Sera-Brynn, Executive Vice President  This article is the fifth in a series. The protection of Covered Defense Information (CDI) that resides on or transits through contractor information systems is of paramount importance to the Department of Defense (DoD). Particularly in light of the stunning volume of cyber attacks on DoD networks. Over… Read more »

What you need to know about DFARS and Cloud Computing Services

By Heather Engel, Sera-Brynn, Executive Vice President  This article is the third in a series. Don’t be overwhelmed by mandatory cybersecurity requirements implemented by the Department of Defense (DoD) on contractors and subcontractors. Becoming compliant under Defense Federal Acquisitions Regulations Supplement (DFARS) 252.204-7012 has to be viewed simply as a necessity of doing business with the… Read more »

Become DFARS Compliant Using the Sera-Brynn Method

By Heather Engel, Sera-Brynn, Executive Vice President This article is the second in a series. Cybersecurity requirements for Department of Defense (DoD) contractors and subcontractors are here and getting compliant under Defense Federal Acquisitions Regulations Supplement (DFARS) can feel daunting. It doesn’t have to be. In this second part of our blog series on DFARS,… Read more »

Navigating DFARS to ensure compliance and avoiding trouble

By Heather Engel, Sera-Brynn, Executive Vice President This article is the first in a series. In a world of high stakes security, it’s incumbent upon government contractors to comply with federal regulations. The largest buyer of goods and services in the world is the U.S. federal government, with the Department of Defense (DoD) contributing a… Read more »

The steps of a cyber criminal

Some cyber crime requires criminals to have high-level information security and technology skills to achieve the goal of a full data breach. In a world of virtual reality where it seems the sky’s the limit, it would stand to reason that bad actors would target businesses with the most valuable data. But cyber criminals, much… Read more »

Sera-Brynn and Kaufman & Canoles discuss DFARS and cybersecurity safeguards for government contractors

Recent high-profile attacks on government agencies highlight the risks federal contractors are taking when they aren’t serious about protecting government information. For Department of Defense contractors, Defense Federal Acquisition Regulation Supplement (DFARS) 252.204-7012 imposes security safeguards and mandatory reporting requirements on DoD contracting companies. In order to show compliance with DFARS, companies must implement, document,… Read more »

550+ Universities Have Been Targeted for Cyber Attacks: How Higher Education Institutes Can Better Handle Them

For two years Chinese hackers had unfettered access to computers used for specialized aerospace engineering research in a lab that works mainly for the Pentagon, as well as at a site that develops technology for the U.S. Navy. But it wasn’t a defense contracting firm hackers were targeting. It was Penn State University, one of… Read more »