Trending Topics

Defensive Cyber Operations: Cyberwarfare Explained

With the average ransom payment almost doubling from $812,380 in 2022 to $1,542,333 in 2023, and with DDoS attacks and malicious bot traffic rising, it’s even more alarming that, in…

Learn More

Implementing Security Controls: An Intro to JSIG

By Walker Haddock and Spencer Shimko Occasions often arise requiring information system owners to be diligent when it comes to protecting their data and projects. Researchers feel burdened by having…

Learn More

Cross Domain Solutions and Weapons Systems

The next security domain in human protection Often, the sharing of potentially sensitive information between two security domains with varying classifications or security levels needs to happen. A high-speed system…

Learn More

The Undetected Breach

On Monday, your customers unknowingly install malicious updates permitting malware to spread throughout your system undetected. Tuesday, the single breach of security at your company triggers a supply chain incident…

Learn More

Mapping Out the NIST Risk Management Framework (RMF)

The days of the DoD Information Assurance Certification and Accreditation Process (DIACAP) are phasing out.  The DoD and all federal agencies are now using a new risk management framework (RMF)…

Learn More

CAN Bus Vulnerabilities Raise Threats for Cars and Tanks  

In April 2023, media outlets reported escalating high-end car thefts using a technique that caused a vehicle’s immobilizer system to malfunction. The attack exploited a vulnerability in the car’s control…

Learn More

Cross Domain Solutions: What They Are, How They Work, and What Makes Them Effective

Whether in military or intelligence missions or in globally linked enterprises, we increasingly rely on secure information sharing across different sectors for effective execution. However, the very agencies and industries…

Learn More

What Is Enterprise Architecture and How Does It Help Your Business Soar?

Countless entrepreneurs set goals that fail because of their vague nature. But how do you translate an abstract vision into a concrete business strategy? More importantly, how do you determine…

Learn More

What Is Threat Monitoring, and How Can It Help You Prevent Cyber Threats?

With the growing amount of devices with internet access and the application areas of artificial intelligence (AI) expanding, the number of known threats is also steadily rising. This is the…

Learn More