<?xml version="1.0" encoding="UTF-8"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Cardinal Six Cyber — Blog</title><link>https://cardinalsixcyber.com/blog</link><description>Practitioner analysis and practical guidance on CMMC, DFARS, NIST, and federal cybersecurity compliance for defense contractors.</description><language>en-us</language><lastBuildDate>Mon, 04 May 2026 03:27:23 GMT</lastBuildDate><atom:link href="https://cardinalsixcyber.com/rss.xml" rel="self" type="application/rss+xml"/><item><title><![CDATA[Change Healthcare and Business Associate Risk: What Healthcare Supply Chains Need to Prove]]></title><link>https://cardinalsixcyber.com/blog/change-healthcare-supply-chain-risk-business-associates</link><guid isPermaLink="true">https://cardinalsixcyber.com/blog/change-healthcare-supply-chain-risk-business-associates</guid><pubDate>Mon, 04 May 2026 00:00:00 GMT</pubDate><description><![CDATA[The Change Healthcare incident made business-associate cybersecurity a board-level healthcare risk. Contract language is not enough.]]></description><category>HIPAA</category><category>Healthcare</category><category>Supply Chain</category><category>Incident Response</category><category>Risk Management</category></item><item><title><![CDATA[Healthcare Ransomware Control Priorities: The NIST 800-53 Families To Move First]]></title><link>https://cardinalsixcyber.com/blog/healthcare-ransomware-control-priorities-nist-800-53</link><guid isPermaLink="true">https://cardinalsixcyber.com/blog/healthcare-ransomware-control-priorities-nist-800-53</guid><pubDate>Mon, 04 May 2026 00:00:00 GMT</pubDate><description><![CDATA[A practical sequencing guide for healthcare ransomware resilience using NIST SP 800-53 control families.]]></description><category>Healthcare</category><category>Ransomware</category><category>NIST</category><category>Incident Response</category><category>Risk Management</category></item><item><title><![CDATA[Why HIPAA Compliance Is Not Enough: A NIST Control Roadmap After Change Healthcare]]></title><link>https://cardinalsixcyber.com/blog/hipaa-nist-control-roadmap-change-healthcare</link><guid isPermaLink="true">https://cardinalsixcyber.com/blog/hipaa-nist-control-roadmap-change-healthcare</guid><pubDate>Mon, 04 May 2026 00:00:00 GMT</pubDate><description><![CDATA[The Change Healthcare breach shows why healthcare organizations need NIST control depth beyond the HIPAA Security Rule floor.]]></description><category>HIPAA</category><category>NIST</category><category>Healthcare</category><category>Risk Management</category><category>Ransomware</category></item><item><title><![CDATA[NIST vs HITRUST, ISO 27001, COBIT, and CIS: Which Framework Fits Healthcare Compliance?]]></title><link>https://cardinalsixcyber.com/blog/nist-vs-hitrust-iso-cobit-cis-healthcare</link><guid isPermaLink="true">https://cardinalsixcyber.com/blog/nist-vs-hitrust-iso-cobit-cis-healthcare</guid><pubDate>Mon, 04 May 2026 00:00:00 GMT</pubDate><description><![CDATA[A practical comparison of the major security frameworks for healthcare organizations with HIPAA, SEC, privacy, and ransomware risk.]]></description><category>HIPAA</category><category>NIST</category><category>HITRUST</category><category>ISO 27001</category><category>Healthcare</category></item><item><title><![CDATA[Prioritized Controls for Compliance: A Healthcare Case Study of UnitedHealth Group]]></title><link>https://cardinalsixcyber.com/blog/prioritized-controls-compliance-healthcare-case-study-unitedhealth</link><guid isPermaLink="true">https://cardinalsixcyber.com/blog/prioritized-controls-compliance-healthcare-case-study-unitedhealth</guid><pubDate>Mon, 04 May 2026 00:00:00 GMT</pubDate><description><![CDATA[A full research paper applying NIST SP 800-66r2 and SP 800-53r5 to healthcare compliance after Change Healthcare.]]></description><category>HIPAA</category><category>NIST</category><category>Healthcare</category><category>Risk Management</category><category>Supply Chain</category></item><item><title><![CDATA[The CIS Controls v8 IG1 → NIST SP 800-171 Crosswalk for DIB Contractors]]></title><link>https://cardinalsixcyber.com/blog/cis-controls-v8-ig1-nist-800-171-crosswalk</link><guid isPermaLink="true">https://cardinalsixcyber.com/blog/cis-controls-v8-ig1-nist-800-171-crosswalk</guid><pubDate>Sun, 26 Apr 2026 00:00:00 GMT</pubDate><description><![CDATA[If your program runs on CIS Controls v8 IG1, here is what that gets you against the 110 NIST SP 800-171 practices a C3PAO assesses — and where the gaps are.]]></description><category>CMMC</category><category>NIST</category><category>CIS Controls</category><category>Compliance</category><category>DIB</category></item><item><title><![CDATA[Inside a CMMC Level 2 Journey: A Mid-Tier DIB Contractor Case Study]]></title><link>https://cardinalsixcyber.com/blog/cmmc-level-2-mid-tier-dib-case-study</link><guid isPermaLink="true">https://cardinalsixcyber.com/blog/cmmc-level-2-mid-tier-dib-case-study</guid><pubDate>Sun, 26 Apr 2026 00:00:00 GMT</pubDate><description><![CDATA[A composite case study of a 350-person defense subcontractor with 47 suppliers and 15 months to reach CMMC Level 2 — and the scope-discipline strategy that makes it possible.]]></description><category>CMMC</category><category>NIST</category><category>Risk Management</category><category>DIB</category><category>Supply Chain</category></item><item><title><![CDATA[AI-Enabled Threats Against Defense Contractors: How ADSAI Is Changing the Attack Surface]]></title><link>https://cardinalsixcyber.com/blog/ai-enabled-threats-defense-contractors-adsai</link><guid isPermaLink="true">https://cardinalsixcyber.com/blog/ai-enabled-threats-defense-contractors-adsai</guid><pubDate>Sun, 19 Apr 2026 00:00:00 GMT</pubDate><description><![CDATA[How ADSAI tools are changing the attack surface for defense contractors: five threat vectors, the dual-use paradox, and a layered defense framework built on mission continuity.]]></description><category>Threat Intelligence</category><category>AI Security</category><category>Risk Management</category><category>Critical Infrastructure</category></item><item><title><![CDATA[CMMC 2.0 Levels, Assessment Paths, and What Certification Actually Costs]]></title><link>https://cardinalsixcyber.com/blog/cmmc-2-levels-assessment-cost</link><guid isPermaLink="true">https://cardinalsixcyber.com/blog/cmmc-2-levels-assessment-cost</guid><pubDate>Sun, 19 Apr 2026 00:00:00 GMT</pubDate><description><![CDATA[A plain-language breakdown of CMMC 2.0's three levels, two assessment paths, POA&M rules, phase-in schedule, and the real cost numbers from DoD's regulatory impact analysis.]]></description><category>CMMC</category><category>Assessment</category><category>Compliance</category><category>DIB</category></item><item><title><![CDATA[CMMC POA&M Rules: The 80 Percent Threshold, 5/3-Point Restriction, and 180-Day Window]]></title><link>https://cardinalsixcyber.com/blog/cmmc-poam-rules-80-percent-180-days</link><guid isPermaLink="true">https://cardinalsixcyber.com/blog/cmmc-poam-rules-80-percent-180-days</guid><pubDate>Sun, 19 Apr 2026 00:00:00 GMT</pubDate><description><![CDATA[How Plans of Action and Milestones work under the CMMC 2.0 final rule — the 80% implementation floor, which controls block conditional certification, and what happens at day 180.]]></description><category>CMMC</category><category>Compliance</category><category>DIB</category></item><item><title><![CDATA[CUI vs FCI: What the Difference Means for Your DFARS and CMMC Obligations]]></title><link>https://cardinalsixcyber.com/blog/cui-vs-fci-dfars-cmmc-explained</link><guid isPermaLink="true">https://cardinalsixcyber.com/blog/cui-vs-fci-dfars-cmmc-explained</guid><pubDate>Sun, 19 Apr 2026 00:00:00 GMT</pubDate><description><![CDATA[CUI vs FCI explained — how each category determines your CMMC level, which DFARS clauses apply, and what scoping errors create the most compliance exposure.]]></description><category>CMMC</category><category>DFARS</category><category>Compliance</category><category>DIB</category></item><item><title><![CDATA[DFARS 7012 Incident Reporting: What to Include in a 72-Hour Cyber Incident Report]]></title><link>https://cardinalsixcyber.com/blog/dfars-7012-72-hour-incident-report-what-to-include</link><guid isPermaLink="true">https://cardinalsixcyber.com/blog/dfars-7012-72-hour-incident-report-what-to-include</guid><pubDate>Sun, 19 Apr 2026 00:00:00 GMT</pubDate><description><![CDATA[What a DFARS 7012 cyber incident report must contain, when the 72-hour clock starts, what to preserve, and common reporting errors that create compliance exposure.]]></description><category>DFARS</category><category>Compliance</category><category>DIB</category></item><item><title><![CDATA[The DFARS Clause Stack: What 7012, 7019, 7020, and 7021 Actually Require]]></title><link>https://cardinalsixcyber.com/blog/dfars-clause-stack-7012-7019-7020-7021</link><guid isPermaLink="true">https://cardinalsixcyber.com/blog/dfars-clause-stack-7012-7019-7020-7021</guid><pubDate>Sun, 19 Apr 2026 00:00:00 GMT</pubDate><description><![CDATA[What DFARS 7012, 7019, 7020, and 7021 actually require — incident reporting, SPRS scoring, DoD assessment authority, and CMMC award conditions for defense contractors.]]></description><category>CMMC</category><category>DFARS</category><category>Compliance</category><category>DIB</category></item><item><title><![CDATA[Federal Cybersecurity Law and the Defense Industrial Base: Fragmentation, Implementation Lag, and the Case for Reform]]></title><link>https://cardinalsixcyber.com/blog/federal-cybersecurity-law-dib-fragmentation</link><guid isPermaLink="true">https://cardinalsixcyber.com/blog/federal-cybersecurity-law-dib-fragmentation</guid><pubDate>Sun, 19 Apr 2026 00:00:00 GMT</pubDate><description><![CDATA[A practitioner analysis of how FISMA, DFARS, CMMC, CIRCIA, and sector-specific statutes interact — and where the current framework still breaks down.]]></description><category>CMMC</category><category>DFARS</category><category>FISMA</category><category>Policy</category><category>Supply Chain</category></item><item><title><![CDATA[NIST SP 800-171 Revision 3 Is Published. Your CMMC Assessment Still Uses Revision 2.]]></title><link>https://cardinalsixcyber.com/blog/nist-800-171-revision-2-vs-revision-3-cmmc-gap</link><guid isPermaLink="true">https://cardinalsixcyber.com/blog/nist-800-171-revision-2-vs-revision-3-cmmc-gap</guid><pubDate>Sun, 19 Apr 2026 00:00:00 GMT</pubDate><description><![CDATA[CMMC 2.0 still references NIST SP 800-171 Rev 2, but NIST published Rev 3 in May 2024. Here is what the version gap means for your SSP, C3PAO assessment, and compliance roadmap.]]></description><category>CMMC</category><category>NIST</category><category>Compliance</category><category>DIB</category></item><item><title><![CDATA[SPRS Scoring: How to Self-Score Your NIST SP 800-171 Assessment]]></title><link>https://cardinalsixcyber.com/blog/sprs-scoring-nist-800-171-self-assessment</link><guid isPermaLink="true">https://cardinalsixcyber.com/blog/sprs-scoring-nist-800-171-self-assessment</guid><pubDate>Sun, 19 Apr 2026 00:00:00 GMT</pubDate><description><![CDATA[How the DoD SPRS scoring methodology works, what the -203 to 110 scale means, and what common scoring mistakes cost contractors at award time.]]></description><category>CMMC</category><category>DFARS</category><category>Compliance</category><category>DIB</category></item></channel></rss>