Resources

Learn more about Abacode! Here you can find more information about our services and read our latest news and blogs!

Featured
White Paper
CMMC Process Overview and Buyer’s Guide

CMMC will be mandatory for all entities doing business with the DoD at any level who store, transmit, or process information that meets the standards for FCI or...

Learn More
Filter by:

Asset Type

Tags

  • Blog

  • Blog

    Practical Guide to CUI Identification for DIB Contractors

    As defense contractors prepare for Cybersecurity Maturity Model Certification (CMMC), one of the most crucial and often challenging steps is properly identifyin...

    April 15, 2025
  • Blog

    The FAR CUI Rule and Its Impact on Government Contractors 

    This rule represents a critical evolution in how government contractors handle sensitive information across federal agencies, following a tighter regulation on ...

    March 3, 2025
  • Blog

    An Introduction to SOC 2 Compliance

    SOC 2 (Service Organization Control 2) is a voluntary compliance standard developed by the American Institute of Certified Public Accountants (AICPA). It focuse...

  • What is CMMC
    Blog

    What is Cybersecurity Maturity Model Certification (CMMC)?

    The Cybersecurity Maturity Model Certification (CMMC) program isn't just an option when seeking contract awards with the U.S. government – it's a necessity.

  • Blog

    CMMC Title 32 Rule Becomes Official

    CMMC Title Rule 32 is now official and Cyber AB has set a date for when C3PAOs can start CMMC level 2 voluntary assessments.

    December 16, 2024
  • Blog

    Insights from Hacker Summer Camp ‘24 

    Our CTO, Jeremy Rasmussen, discusses his insights and learnings from Hacker Summer Camp 2024 in Las Vegas.

    August 14, 2024
  • Blog

    Why Choose a Managed Cybersecurity Program?

    For small to mid-sized businesses, managing cybersecurity in-house can be challenging, costly, and inefficient. This is where a managed cybersecurity program be...

    August 8, 2024
  • Blog

    Breakdown of Third-Party Risk Management

    As businesses become increasingly reliant on external vendors and partners to enhance their operations, the importance of Third Party Risk Management (TPRM) has...

    July 16, 2024
  • Blog

    Zero Trust Architecture: An Overview of its Principles

    In recent years, the frequency and severity of security breaches have increased, prompting businesses to adopt stronger security measures. One such approach is ...

    July 8, 2024
  • 1 of 3

  • 3