The CMMC and continuous monitoring – is it a good idea?

In April of this year, the CMMC advisory board issued an interesting RFP that caught a few off guard and raised a lot of questions among the defense industrial base (DIB). That RFP involved the creation of a continuous monitoring…

General Dynamics – Ordnance and Tactical Systems CISO Talks Best Cyber Practices in Defense Industrial Base

The movement towards remote work and digital tools over the past few months has resulted in a massive change in the amount of data flowing over networks and has drastically increased the importance of advanced IT tools and capabilities across…

CMMC V1.0 – what is it and will it work?

Last week, my associate, Shane Rogers, shared an article on the GovCybersecurityHub discussing the Cybersecurity Maturity Model Certification (CMMC) and its potential impact on small- and medium-sized government contractors. Shane concluded that the Department of Defense (DoD) is taking incredible…

CMMC for SMBs – What should smaller contractors expect?

on January 31, 2020, the Honorable Ellen Lord, who currently serves as the Under Secretary of Defense for Acquisition and Sustainment, delivered the opening statement at the beginning of the official press briefing for the release of Cybersecurity Maturity Model…

Increasing application security in the DoD supply chain

In an attempt to improve the security of the Department of Defense (DoD) supply chain, the Pentagon recently released new cybersecurity standards for its contractors. While I’ll be taking a deeper dive into those standards in a future article, they…

Why leadership is essential for government cybersecurity – a Q&A with ICIT

The federal government is facing a confluence of factors that make defending their networks increasingly difficult at a time when the number and sophistication of the malicious actors attacking them is only increasing. That’s what we heard when we recently…

Practice makes perfect – honing incident response skills

Practice makes perfect. It’s a cliché for a reason, because it’s very true. The more you work at a particular skill or task, the better and more proficient that you become at it. Unfortunately for the cyberwarriors that are tasked…

Can Analytics Help the Military Better Plan for Cyberattacks?

According to a recent report by Booz Allen Hamilton, The sheer complexity of military systems, the numerous interconnections between systems and missions, and the siloed nature of military organizations makes it difficult for the senior military leaders to quickly and…

Military Struggles to Identify Full Impact of Potential Cyber Attacks

Today’s weapon systems used by our warfighters against our largest adversaries are increasingly network-enabled. Unfortunately, the network-centric nature of these systems opens them up for cyberattack – making it possible for our adversaries to deny our military’s weapon systems when…

What Steps Can the Military Take to Secure Weapon Systems?

Today’s military platforms and weapon systems are increasingly network and software-enabled, which is helping to make them more effective and efficient tools for the warfighter, but is opening them up to a new avenue of attacks that less connected and…