U.S. Department of Defense Leads the Industry with Cloud-Based Internet Isolation Program

Back in April 2019, the Menlo Security team learned that our Partner By Light IT Professional Services LLC and Menlo Security were one of two solution providers selected to design and implement ...

Department of Defense Selects D2iQ for DevSecOps Solutions and Services

| | D2iQ, DoD
D2iQ’s enterprise-grade solutions and services now available to the DoD, improving cloud native application and data security SAN FRANCISCO, April 13, 2020 /PRNewswire/ — D2iQ, the leading provider of enterprise-grade cloud platforms that power smarter ...
Security Boulevard
Ryuk Reportedly Behind Ransomware Infection at DOD Contractor

Ryuk Reportedly Behind Ransomware Infection at DOD Contractor

A Ryuk sample was reportedly responsible for a ransomware infection at a contractor for the U.S. Department of Defense (DOD). According to ZDNet, Electronic Warfare Associates (EWA) suffered a ransomware infection in ...
White Hat Hackers Earned More Than $30,000 from DoD’s Bug Hunting Program

White Hat Hackers Earned More Than $30,000 from DoD’s Bug Hunting Program

The U.S. Department of Defense (DoD) awarded prizes of over $30,000 to hackers in a bug bounty program aiming to strengthen the network infrastructure for proxies, VPNs and VDIs (virtual desktops.) The ...

How Will the CMMC Impact My Business and How Can We Prepare? Part 3 of 3

| | CMMC, Cybersecurity, DoD, government
Combining Cyber Standards – Is ‘Unified’ Always A Good Approach? The CMMC enforcement model will require a significant adjustment to the way contractors conduct government business – from procurement to execution. In ...

How Will the CMMC Impact My Business and How Can We Prepare? Part 1 of 3

| | CMMC, cyberattack, DoD, government
Part 1: Laying the Groundwork for Achieving Certification In June of this year, my colleague Tom Taylor wrote about the DoD’s announcement to instate the Cyber Security Maturity Model Certification (CMMC) and ...
identity fraud

Service Members Targeted in Identity Fraud Scheme

Five individuals were indicted for the reprehensible crime of defrauding U.S. military veterans and current service members of their benefits. The five accused of the fraud are identified as Robert Wayne Boling ...
Security Boulevard
Supply Chain Vulnerabilities from Legacy Approaches

Supply Chain Vulnerabilities from Legacy Approaches

| | DoD, PreVeil, supply chain
In a recent customer discussion, a CISO shared his concern with me regarding his company’s data. He worried that confidential data that had been shared with their suppliers would be leaked. He ...

The CMMC – A Palatable Enforcement Solution to DFARS Requirement?

My colleagues and I have been warning about the Department of Defense’s (DoD’s) looming enforcement of DFARS clause 252.204-7012 for a while now, as many Tripwire customers handle government CUI. Inevitably, we ...

EDR + Application Containment: Redefining the Modern Endpoint Security Stack

Despite record spending on cyber security, government agencies are not making significant headway in winning a battle against cybercrime. New white paper explores how threat-actors continues to be successful in bypassing layered ...