<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=352585001801011&amp;ev=PageView&amp;noscript=1">

Information technology blog, cybersecurity blog

Kelser Blog, Media, and News

All the latest Kelser news, media appearances, event recaps, press releases, and articles covering topics such as cybersecurity, business continuity, disaster recovery, networking and managed services, in one convenient place.

Blog Feature

Cybersecurity | Compliance | NIST

By: Eileen Smith
December 06, 2024

With only about a week to go before the Cybersecurity Maturity Model Certification (CMMC) is set to go into effect on December 16, if you’re among the businesses that haven’t started preparing for CMMC certification, you don’t have any more time to delay.

Blog Feature

Cybersecurity | Compliance | IT Support | NIST

By: Patrick Martin
November 05, 2024

Now that the much-anticipated final rule establishing the U.S. Department of Defense (DoD) Cybersecurity Maturity Model Certification (CMMC) Program has cleared its last regulatory hurdle, you may have more questions than answers.

Cybersecurity-Cover-01

Improving Your Cybersecurity Posture Isn't as Hard as it Sounds

Start improving your cybersecurity posture now with this ebook, free when you subscribe to our blog.

Blog Feature

Compliance | IT Support | NIST

By: Tyler Thepsiri
May 21, 2024

If you work as a contractor or subcontractor to the U.S. government, you likely know that not all sensitive information is marked “secret,” “top secret,” or “classified.”

Blog Feature

Cybersecurity | Compliance | NIST

By: Karen Cohen
March 09, 2024

If your organization works with the government as a contractor, subcontractor, or supplier, you are likely familiar with the rules and regulations regarding information labeled secret, top secret, or classified.

Back to Top