What your organization needs to know about CMMC

The Cybersecurity Maturity Model Certification (CMMC) is a new requirement from the U.S. Department of Defense (DoD). It mandates that DoD contractors obtain third-party certification to ensure appropriate levels of cybersecurity practices are in place to meet “basic cyber hygiene,” as well…

Just how vulnerable is the 2020 election to outside interference?

Editor’s Note: The 2020 election is set, with both tickets identified and candidates preparing to accept their parties’ nominations at their national conventions in the coming weeks. Those national conventions will look and feel very different from years past, when…

Securing school networks in the age of COVID-19

We are in the midst of a dramatic global cultural change due to the COVID-19 pandemic. Online education and remote work environments that were once flexible options are now becoming the new normal — and demand is only increasing. Due…

Why increased cyber vigilance is needed within the education sector – a Q&A with Otavio Freire

Cybersecurity attacks are on the rise across all spectrums of society, including institutions of higher education. Malware, ransomware, and spear-phishing attacks against universities and colleges have increased, especially since the move to remote learning has become a necessity. Increased vigilance…

“Some Things Haven’t Changed” – Chris Wilkinson discusses the difficult task of defending government networks

Just last month, the Prime Minister of Australia, Scott Morrison, announced that his country was facing a massive cyberattack that was impacting, “Australian organizations across a range of sectors, including all levels of government, industry, political organizations, education, health, essential…

How the New Jersey Cybersecurity and Communications Integration Cell Works to Protects Against a “Cyber 9-11”

Increasingly sophisticated malicious actors can use a growing number of vectors to attack a government’s network infrastructure, and because governments, like organizations of all kinds, are more reliant on the network than ever, the prospect of a disruptive, and even…

The CMMC and continuous monitoring – is it a good idea?

In April of this year, the CMMC advisory board issued an interesting RFP that caught a few off guard and raised a lot of questions among the defense industrial base (DIB). That RFP involved the creation of a continuous monitoring…

Ohio Chief Information Officer Highlights Challenges for State Cybersecurity

All governments, be they at the federal, state, or local level, need to invest in a cybersecurity infrastructure that is vigilantly monitored and maintained.  Part of the reason is that governments of all sizes need to deal with motives and…

CIO of the Illinois State Treasurer’s Office on the importance of executive buy-in to cyber initiatives

When we think about the types of companies and organizations that are often targets of cyberattacks, we tend to think about the companies with something that e-criminals want. These are crimes being perpetrated by criminals, after all. They wouldn’t take…

The role of AI in battling opportunistic malware and ransomware attacks

The ongoing COVID-19 pandemic in our country may be dominating the headlines, but it’s not the only threat that government agencies need to be worried about. While the nation’s attention remains focused on the coronavirus, an old foe is lurking…