Department of Defense
Key takeaways from the latest DoD Enterprise DevSecOps Fundamentals update
As the cybersecurity landscape changes and threats evolve, the Department of Defense (DoD) has updated its Enterprise DevSecOps Fundamentals to align development practices with security imperatives further. This is part of a ...
Drones and the US Air Force
Fascinating analysis of the use of drones on a modern battlefield—that is, Ukraine—and the inability of the US Air Force to react to this change. The F-35A certainly remains an important platform ...
DoD Email Breach: Pentagon Tells Victims 12 Months Late
3TB Email FAIL: Personal info of tens of thousands leaks. Microsoft cloud email server was missing a password ...
Data Brokers Sell Sensitive Data of US Military and Veterans
Follow the Money: Foreign buyers welcome. No questions asked. 12¢ per ...
OPSEC FAIL: US Military Email Going to Mali — via Typo
MX Mixup: Russian-allied government can intercept “highly sensitive information”—because there’s no “I” in .ML ...
Surprise! US DoD Server Had no Password — 3TB of Sensitive Data Leaked
Sensitive military data found on unprotected Microsoft Azure server. Defense Department email store left insecure for at least 11 days ...
U.S. government warns that sensitive data is being stolen from defence contractors
The Federal Bureau of Investigation (FBI), Department of Homeland Security Cybersecurity and Infrastructure Security Agency (CISA), and National Security Agency (NSA) have joined forces to publish a joint warning that Russian hackers ...
Major Updates to the Cybersecurity Maturity Model Certification: What You Need to Know
The United States Department of Defense (DoD) views securing the supply chain and the Defense Industrial Base (DIB) as one critical pillar in protecting national security. Dedicated security requirements exist for the ...
If You Don’t Hire Robots to Attack Your Networks, You’re Not Doing Security Right
Complying with DoD’s new cybersecurity regulations requires hard data, the kind that pretty much requires automation to compile. The post If You Don’t Hire Robots to Attack Your Networks, You’re Not Doing ...
Remote Access for Office 365 for the Department of Defense
Before we discuss remote access for Office 365 for the Department of Defense, it’s important to look at how remote access has shifted this last year and the security challenges surrounding remote ...