DoD - Tagged - Security Boulevard

If You Don’t Hire Robots to Attack Your Networks, You’re Not Doing Security Right

Complying with DoD’s new cybersecurity regulations requires hard data, the kind that pretty much requires automation to compile. The post If You Don’t Hire Robots to Attack Your Networks, You’re Not Doing ...

If You Don’t Hire Robots to Attack Your Networks, You’re Not Doing Security Right

Complying with DoD’s new cybersecurity regulations requires hard data, the kind that pretty much requires automation to compile. The post If You Don’t Hire Robots to Attack Your Networks, You’re Not Doing ...
Secure Remote Application Access - WW Hybrid NAC Market Share

Remote Access for Office 365 for the Department of Defense

Before we discuss remote access for Office 365 for the Department of Defense, it’s important to look at how remote access has shifted this last year and the security challenges surrounding remote ...
CISA and DoD Warn of Sophisticated Threat Actor Wielding New SlothfulMedia Malware

CISA and DoD Warn of Sophisticated Threat Actor Wielding New SlothfulMedia Malware

The US Cybersecurity and Infrastructure Security Agency (CISA) and the Department of Defense (DOD) Cyber National Mission Force (CNMF) have revealed that new malware dubbed SlothfulMedia is currently used by a sophisticated ...

U.S. Department of Defense Leads the Industry with Cloud-Based Internet Isolation Program

Back in April 2019, the Menlo Security team learned that our Partner By Light IT Professional Services LLC and Menlo Security were one of two solution providers selected to design and implement ...

Department of Defense Selects D2iQ for DevSecOps Solutions and Services

| | D2iQ, DoD
D2iQ’s enterprise-grade solutions and services now available to the DoD, improving cloud native application and data security SAN FRANCISCO, April 13, 2020 /PRNewswire/ — D2iQ, the leading provider of enterprise-grade cloud platforms that power smarter ...
Security Boulevard
Ryuk Reportedly Behind Ransomware Infection at DOD Contractor

Ryuk Reportedly Behind Ransomware Infection at DOD Contractor

A Ryuk sample was reportedly responsible for a ransomware infection at a contractor for the U.S. Department of Defense (DOD). According to ZDNet, Electronic Warfare Associates (EWA) suffered a ransomware infection in ...
White Hat Hackers Earned More Than $30,000 from DoD’s Bug Hunting Program

White Hat Hackers Earned More Than $30,000 from DoD’s Bug Hunting Program

The U.S. Department of Defense (DoD) awarded prizes of over $30,000 to hackers in a bug bounty program aiming to strengthen the network infrastructure for proxies, VPNs and VDIs (virtual desktops.) The ...

How Will the CMMC Impact My Business and How Can We Prepare? Part 3 of 3

| | CMMC, Cybersecurity, DoD, government
Combining Cyber Standards – Is ‘Unified’ Always A Good Approach? The CMMC enforcement model will require a significant adjustment to the way contractors conduct government business – from procurement to execution. In ...

How Will the CMMC Impact My Business and How Can We Prepare? Part 1 of 3

| | CMMC, cyberattack, DoD, government
Part 1: Laying the Groundwork for Achieving Certification In June of this year, my colleague Tom Taylor wrote about the DoD’s announcement to instate the Cyber Security Maturity Model Certification (CMMC) and ...

Techstrong Group