U.S. Can Expect to see more Ransomware Attacks

In the cybersecurity space, there are many things we do not all agree on, but one thing I have noticed in the past year is that we all agree that the U.S ...

Bad Ending for Washington, D.C.’s Metropolitan Police Department (MPD) after a Ransomware Attack

A group of ransomware hackers known as “Babuk” leaked internal police files from the Washington, D.C. Metropolitan Police Department (MPD).  The information was stolen in late April.  The post Bad Ending for ...

Colonial Pipeline Ransomware Attack

One of the nation's largest fuel pipelines has been forced to shut down after being affected by a ransomware cyberattack.  Ransomware is a form of malware that encrypts a victim's files. The attacker then ...

Ransomware attack leads to shutdown of major U.S. pipeline system

By: David E. Sanger A cyberattack forced the shutdown of one of the largest pipelines in the United States, in what appeared to be a significant attempt to disrupt vulnerable energy infrastructure. The ...

Supply Chain Risk Management (SCRM) Explained

Supply chain risk management (SCRM) is the process of identifying, assessing, and mitigating the risks associated with the distributed and interconnected nature of IT products and service supply chain ...

The Civilian Cybersecurity Reserve: A National Guard-like program to address growing cybersecurity vulnerabilities faced by the U.S. government

This would be like a Civilian Cybersecurity Reserve and it would be voluntary and by invitation only.  This would allow our national security agencies to have access to the qualified, capable, and ...
 Cliché Myths and Misconceptions Around Security and Connectivity

Time to Retire a Cybersecurity Cliché

I’ve had it.  It is time to retire some of the old, worn-out cybersecurity clichés polluting the landscape. Clichés are painful to hear.  At the top of the list is the ‘defender’s ...
Security Boulevard

Update Greenbone Vulnerability Management Plugins (NVT, Cert Data & SCAP Data) Automatically

Once you have installed or configured the Greenbone Vulnerability Management system it is a good idea to ensure it is kept up to date and running the latest security scripts to find ...

SA.3.169 Community-based Threat Sharing (CMMC Level 3)

Receive and respond to cyber threat intelligence from information sharing forums and sources and communicate to stakeholders ...
ransomware Babuk Locker

Winning the Cybersecurity Contest

Cybersecurity is a competitive endeavor. This contest is framed as ‘us versus them,’ attackers versus defenders, and good guys versus bad guys. Analogies to sporting contests are common, thus resulting in similar ...
Security Boulevard