The Defense Federal Acquisition Regulation Supplement (DFARS) has been a central focus for contractors working with Covered Defense Information (CDI) […]
Understanding botnets
What is a botnet? The term “botnet” refers to a collection of computers that have been affected by malicious software, […]
Did you miss the DFARS cybersecurity deadline of December 31, 2017? Originally issued in August 2015 and subsequently revised several […]
Key Reinstallation AttaCK: aka KRACK
A Technical Overview Recently, the news has been full of highly publicized but often misunderstood, vulnerabilities affecting a range of […]
The number of passwords an individual user must remember to use services in the digital space continues to grow daily. […]
Congratulations to Michael Huffman on passing the 2017 ISACA CISA exam!
Congratulations to Michael Huffman on passing the 2017 ISACA CISA exam! The CISA designation is a globally recognized certification for IS […]
SSPs to Be Included With Future Proposals
Your System Security Plans (SSPs) for NIST 800-171 compliance may be evaluated as part of future proposal submissions. This was […]
In one of, if not the largest, breach of personally sensitive information, Equifax announced the loss of more than 100 […]
The definition of third party management: the process whereby companies monitor and manage interactions with all external parties with which […]
Decrease Successful Hacks by Improving Your Weakest Links
Companies spend millions on technology security annually to keep their virtual doors and windows locked. This investment is a huge […]