Feedback From the Front Lines: Where 'FedRAMP Equivalent' Falls Short
Virtru Blog
by Andrew Lynch
1w ago
The following insights represent real-world feedback I heard from a recognized expert in CMMC compliance who works directly with Defense Industrial Base (DIB) contractors.  ..read more
Visit website
17 State Governments Choose Virtru. Here’s Why.
Virtru Blog
by Megan Leader
1w ago
State and local governments quite literally do it all. From health and human services, to finance and treasury, social services, law enforcement, education, and beyond, they have to do a million little things right every day to keep their communities running smoothly.   ..read more
Visit website
TLS vs. End-to-End Encryption: What’s the Difference?
Virtru Blog
by Megan Leader
1w ago
Not all encryption is created equal. If you’re entrusting sensitive information to a software vendor, and they reassure you that your data will be encrypted, your next question should be, “How?” And the answer to that question should be clear and simple.  ..read more
Visit website
How Universities Can Still Meet CMMC 2.0 Requirements Despite NIH Budget Cuts
Virtru Blog
by Shelby Imes
1w ago
A recent announcement by the National Institute of Health. has sent shockwaves through research universities nationwide. The 15% cap on indirect funding—slashed from the current average of 27-28%—has left institutions scrambling to address what SUNY Chancellor John B. King Jr. described as budget holes "on the order of tens of millions ..read more
Visit website
A Call to Accelerate Zero Trust Adoption and Strengthen Our National Cyber Resilience
Virtru Blog
by Danny Holloway
2w ago
On February 26, 2025, the Department of Defense reiterated the critical importance of a Zero Trust (ZT) cybersecurity model, explicitly calling out how outdated security approaches are exposing U.S. warfighters and sensitive defense systems to espionage and theft ..read more
Visit website
TLS vs. TDF: Base vs Gold Standard for Data Security
Virtru Blog
by Matt Howard
2w ago
When it comes to protecting sensitive data, not all encryption solutions are created equal.  Simply stated, Transport Layer Security (TLS) is the baseline standard for encrypting pipes that transmit sensitive data.  Conversely, Trusted Data Format (TDF) is the gold standard for securing individual data objects -- both in transit and at rest. Let’s explore how these standards stack up ..read more
Visit website
Zero Trust Data Format (ZTDF): The Clear Path to Data Interoperability
Virtru Blog
by Shannon Vaughn
2w ago
The Pentagon’s progress toward Zero Trust compliance recently made headlines when it was reported that the Department of Defense (DoD) is only 14% of the way toward its goal. While that number might seem concerning, it highlights a critical truth: the hardest part of the journey lies in the Identity and Data Pillars. As the Chief of Staff of the Pentagon’s Zero Trust PfMO put it, “It’s got to be interoperable between the DoD, [civilians in the federal government], the IC [intelligence community] and Five Eyes and other mission partner environments ..read more
Visit website
Apple's Unprecedented Response to the UK: No Backdoors, No ADP Either
Virtru Blog
by John Ackerly
2w ago
Imagine being forced to choose between leaving your front door unlocked or not having a door at all. This is the digital equivalent of what Apple faced in the UK, and their response sends a powerful message about the future of digital privacy ..read more
Visit website
Virtru Secure Share Meets Microsoft OneDrive and SharePoint
Virtru Blog
by Editorial Team
3w ago
The Microsoft ecosystem is where your teams get work done. That’s why we're bringing the ability to upload files to Secure Share directly from OneDrive and SharePoint, without ever leaving Secure Share.  ..read more
Visit website
Maximizing CMMC 2.0 Compliance: How Virtru Enhances Google Workspace Security + Protects CUI
Virtru Blog
by Matt Sack
1M ago
Google Cloud's recently released CMMC compliance guide showcases how Google Workspace can serve as a foundation for Defense Industrial Base (DIB) organizations seeking certification. While the platform offers robust security features, achieving true CMMC compliance – and more importantly, genuine security – requires a deeper understanding of how these capabilities work together and where additional protections may be needed ..read more
Visit website

Follow Virtru Blog on FeedSpot

Continue with Google
Continue with Apple
OR