Cocoon Data Blog

July 21, 2021

Driving CMMC across the supply chain

Department of Defense (DoD) requirements mean contractors must ensure CMMC compliance within their own organizations, and throughout their supply chains. With multi-million dollar contracts at stake, the cost of non-compliance – and even small mistakes with suppliers – is significant.

blue sky with cloud
May 30, 2021


Read about the CMMC most frequently asked questions: What is CMMC? The Cybersecurity Maturity Model Certification (CMMC) consists of five levels of maturity that builds upon existing government regulations for cybersecurity across the Defense Industrial Base (DIB).

May 20, 2021

Cocoon Data discusses CMMC with ATLAS Systems

Cocoon Data’s Senior Engineer of US GovCloud Operations, Nick Martin, was invited as a guest speaker to discuss CMMC with Atlas Systems Integration and Support Technologies President, Narada Overton.

February 18, 2021

America’s Small Business Development Center Announcement

Cocoon Data is proud to announce sponsorship of America’s SBDC North Star - CMM initiative. The program raises awareness of the Cybersecurity Maturity Model (CMM) with a focus on protecting confidential information.

December 24, 2020

Why Would You File Share When You Can “SafeShare” Instead?

How eFortresses leveraged SafeShare to streamline CMMC training and implementation processes safely and securely for HISPI and eFortresses CMMCSCORECARD service."

September 22, 2020

Cocoon Data and eFortresses Collaboration CMMC Announcement

Cocoon Data and eFortresses are pleased to announce their strategic partnership, designed to help organizations in the US Dept of Defense supply chain who will be impacted by the introduction of the Cybersecurity Maturity Model Certification (CMMC) later this year.

September 18, 2020

What Defense Contractors Need to Know About the US Government’s CMMC Requirements

Just like any other organization, the cybersecurity of the US Department Of Defense (DOD) is only as strong as its weakest link – currently, many of the contractors and subcontractors providing the products and services to the US DoD are not subject to its strict cybersecurity requirements.

Get great articles direct to your inbox

We’ll never share your details. See our Privacy Policy
We’ll never share your details with third parties.
View our Privacy Policy for more info.