New DoD Regulations for the Cybersecurity Age: Implementing and Paying for the DFARS UCTI Safeguarding Contract Clause

  • Source: Aronson LLC
  • Written By:
  • Published:
  • (Originally Published On:) )
The Department of Defense (DoD)’s acquisition clause on safeguarding unclassified controlled technical information (UCTI) affects DoD contractors of all sizes. Failure to comply with the requirements or to report a cyber incident now constitutes a breach and could result in fines or contract termination. Aronson’s white paper addresses many of the issues surrounding the new clause, including its implications for your business and how to comply.

Featured Software Research:

Beginner's Guide to ERP

For companies considering implementing an enterprise resource planning (ERP) solution, this beginner’s guide describes what to look for, what benefits to expect, pitfalls to avoid, and other issues to consider, and includes a listing of leading vendors in various categories. Read More

Cash is King—And So is Your Supply Chain: How Mid-Market Companies Can Optimize Supply Chain Operations for Strong Cash Flow and Focused Growth

For companies of all sizes and across all industries, cash is not only crucial, it’s king. Just to survive, businesses have to carefully manage their cash flow, making sure that payments aren’t going out faster than resources are coming in.

There are a number of ways companies can automate and optimize their supply chains to improve cash flow, such as building strong relationships and implementing new technology. But it should be noted that making the decision to invest in technology or... Read More

You may also be interested in these related documents:

Cybersecurity Review: Background, Threatscape, Best Practices, and Resources

  • Source: Eset
  • Written By:
  • Published:
Technological innovation has consistently leap-frogged security innovation primarily because security was not part of the initial design of the Internet. As Internet usage matures, the advances in cybersecurity continue to move forward. Read this white paper to learn about various types of threats and best practices for protecting your data. Read More

The Watershed Moment in FISMA 2.0

The Federal Information Security Amendments Act of 2010 (FISMA 2.0) contains several major new provisions, the most significant of which may be a requirement that every agency’s security program include “continuous automated monitoring of information systems used or operated by an agency or by a contractor of an agency or other organization on behalf of an agency.” This paper examines the implications of this requirement and looks at a set of host-based services that can be used to monitor and manage... Read More

8 Reasons to Outsource Your Desktop in the Cloud

With organizations looking for new ways to cut costs and increase productivity, cloud computing has become a popular trend. In the most common form of cloud computing, vendors offer software via the Internet in a software-as-a-service (SaaS) model. Many of the benefits of this model can be translated to desktop management. Learn how SaaS principles are being applied to offer companies desktop-as-a-service (DaaS). Read More
 
comments powered by Disqus