CMMC Resource Page

WE ARE A CMMC REGISTERED PROVIDER ORGANIZATION (RPO) WITH THE EXPERIENCE AND SKILLS TO HELP YOUR ORGANIZATION ACHIEVE CMMC COMPLIANCE AND BETTER UNDERSTAND THE GAPS IN YOUR PROCESSES, CAPABILITIES, AND PRACTICES ACROSS THE 17 CMMC DOMAINS. STAY UP TO DATE WITH OUR CMMC COMPLIANCE RESOURCES BELOW.

Resources

Are you processing controlled unclassified information for Department of Defense clients and required to meet Defense Federal Acquisition Regulation Supplement requirements? Pondurance is here to help you achieve CMMC 2.0 compliance and better understand the gaps in your processes, capabilities, and practices.

Featured Posts

Bad actor disguising virtual identity to perform social engineering scams and business email compromise.


The Cost of Business Email Compromise and Social Engineering Cybercrimes

Federal authorities have arrested hundreds of cybercriminals associated with an international group conducting cyber financial fraud. This group successfully targets and scams accounting services employees through complex schemes involving email, invoice fraud, e-commerce, payroll, and social engineering scams. In this blog, we deep dive into a case study on this cybercriminal organization including:  Motivations and


Read More »

Blue vulnerability patch key on keyboard


The Ever-Evolving Log4j Vulnerability Saga

December 9th, 2021 may turn out to be one of those days that, a decade from now, you remember where you were and what you were doing when you heard the news: A high-severity vulnerability was discovered in Log4j, an open-source Java logging library developed by the Apache Foundation. What has made this zero-day vulnerability


Read More »

Writing blogs about cyber incidents and threats from the past year.


Top 3 Most Popular Blogs of 2021

It has been quite the year for cybersecurity with cyberattacks making the headlines most (if not all) weeks. With all the media coverage and incidents, it created an opportunity for a lot of information sharing and community conversation. Our blog library was full this year of insights into current attacks and events, tips to protect


Read More »