DoD

DoD Turns to Stronger Alliances to Combat Cyberthreats
The Pentagon is undertaking a much more proactive approach to cybersecurity, with plans to more closely partner with the private sector and ally nations being a key part of an overhauled cyber ...

OPSEC FAIL: US Military Email Going to Mali — via Typo
MX Mixup: Russian-allied government can intercept “highly sensitive information”—because there’s no “I” in .ML ...

Surprise! US DoD Server Had no Password — 3TB of Sensitive Data Leaked
Sensitive military data found on unprotected Microsoft Azure server. Defense Department email store left insecure for at least 11 days ...

National Pearl Harbor Remembrance Day, In Memoriam: The 2,403
National Pearl Harbor Remembrance Day, also referred to as Pearl Harbor Remembrance Day or Pearl Harbor Day, is observed annually in the United States on December 7, to remember and honor the ...
Extra, Extra, VERT Reads All About It: Cybersecurity News for the Week of May 2, 2022
All of us at Tripwire’s Vulnerability Exposure and Research Team (VERT) are constantly looking out for interesting stories and developments in the infosec world. Here’s what cybersecurity news stood out to us ...
Major Updates to the Cybersecurity Maturity Model Certification: What You Need to Know
The United States Department of Defense (DoD) views securing the supply chain and the Defense Industrial Base (DIB) as one critical pillar in protecting national security. Dedicated security requirements exist for the ...

Debunking Myths About CMMC 2.0
The cybersecurity world remains dynamic. On November 4, 2021, the Department of Defense (DoD) posted an update to its Cybersecurity Maturity Model Certification (CMMC) initiative, announcing program changes dubbed CMMC 2.0. These ...

Defense Contractors Highly Susceptible to Ransomware
Even as cybercriminals take aim at critical infrastructure, many of the United States’ top 100 federal contractors are inadequately prepared to repel ransomware attacks. These were among the findings of a report ...
Comply 2 Connect (C2C) – A Solution to Quell the Rogues in Our Midst
Have you ever taken a personal device to work and connected it to the work network? Maybe you connected to the Wi-Fi with a mobile device. Perhaps you brought in a personal laptop ...
If You Don’t Hire Robots to Attack Your Networks, You’re Not Doing Security Right
Complying with DoD’s new cybersecurity regulations requires hard data, the kind that pretty much requires automation to compile. The post If You Don’t Hire Robots to Attack Your Networks, You’re Not Doing ...