The CMMC and continuous monitoring – is it a good idea?

In April of this year, the CMMC advisory board issued an interesting RFP that caught a few off guard and raised a lot of questions among the defense industrial base (DIB). That RFP involved the creation of a continuous monitoring…

Ohio Chief Information Officer Highlights Challenges for State Cybersecurity

All governments, be they at the federal, state, or local level, need to invest in a cybersecurity infrastructure that is vigilantly monitored and maintained.  Part of the reason is that governments of all sizes need to deal with motives and…

CIO of the Illinois State Treasurer’s Office on the importance of executive buy-in to cyber initiatives

When we think about the types of companies and organizations that are often targets of cyberattacks, we tend to think about the companies with something that e-criminals want. These are crimes being perpetrated by criminals, after all. They wouldn’t take…

The role of AI in battling opportunistic malware and ransomware attacks

The ongoing COVID-19 pandemic in our country may be dominating the headlines, but it’s not the only threat that government agencies need to be worried about. While the nation’s attention remains focused on the coronavirus, an old foe is lurking…

General Dynamics – Ordnance and Tactical Systems CISO Talks Best Cyber Practices in Defense Industrial Base

The movement towards remote work and digital tools over the past few months has resulted in a massive change in the amount of data flowing over networks and has drastically increased the importance of advanced IT tools and capabilities across…

Unique Government Cybersecurity Challenges and How to Solve Them

When a government entity sets its cybersecurity policy, it faces challenges that the private sector need not worry about.  “Your typical public sector CISO is as capable as their private sector counterparts,” says Rob Sheldon, CrowdStrike’s Head of Technology Strategy,…

Cyberthieves exploiting coronavirus fears spark demand for cyberwarriors

Times of crisis and uncertainty can be frightening for everyday citizens, but they’re opportunities for cyber thieves. And the ongoing coronavirus pandemic is certainly no exception. While as many as 60,000 Americans have died from COVID-19, cyber thieves have ramped…

Nine tips for avoiding COVID-19 cyber schemes

This article was written by Shawn Henry, the President and CSO of CrowdStrike Services. Prior to joining CrowdStrike, Henry worked with the FBI, where he was credited with boosting the bureau’s computer crime and cybersecurity investigative capabilities. This excerpt is…

TransUnion shares the warning signs and financial impact of an insider threat

When people think about cybersecurity and protecting a company, organization or government agency’s networks and data, they picture cyberwarriors doing battle against sophisticated hackers, opposing nation states or hacktivist groups. And while that’s certainly part of the job, they often…

CMMC V1.0 – what is it and will it work?

Last week, my associate, Shane Rogers, shared an article on the GovCybersecurityHub discussing the Cybersecurity Maturity Model Certification (CMMC) and its potential impact on small- and medium-sized government contractors. Shane concluded that the Department of Defense (DoD) is taking incredible…