OPSEC FAIL: US Military Email Going to Mali — via Typo

OPSEC FAIL: US Military Email Going to Mali — via Typo

MX Mixup: Russian-allied government can intercept “highly sensitive information”—because there’s no “I” in .ML ...
Security Boulevard
Surprise! US DoD Server Had no Password — 3TB of Sensitive Data Leaked

Surprise! US DoD Server Had no Password — 3TB of Sensitive Data Leaked

Sensitive military data found on unprotected Microsoft Azure server. Defense Department email store left insecure for at least 11 days ...
Security Boulevard
National Pearl Harbor Remembrance Day, In Memoriam: The 2,403

National Pearl Harbor Remembrance Day, In Memoriam: The 2,403

National Pearl Harbor Remembrance Day, also referred to as Pearl Harbor Remembrance Day or Pearl Harbor Day, is observed annually in the United States on December 7, to remember and honor the ...

Extra, Extra, VERT Reads All About It: Cybersecurity News for the Week of May 2, 2022

All of us at Tripwire’s Vulnerability Exposure and Research Team (VERT) are constantly looking out for interesting stories and developments in the infosec world. Here’s what cybersecurity news stood out to us ...

Major Updates to the Cybersecurity Maturity Model Certification: What You Need to Know

The United States Department of Defense (DoD) views securing the supply chain and the Defense Industrial Base (DIB) as one critical pillar in protecting national security. Dedicated security requirements exist for the ...
CISA risk CMMC Understanding the Power of SOAR for Government

Debunking Myths About CMMC 2.0

The cybersecurity world remains dynamic. On November 4, 2021, the Department of Defense (DoD) posted an update to its Cybersecurity Maturity Model Certification (CMMC) initiative, announcing program changes dubbed CMMC 2.0. These ...
Security Boulevard
defense contractors FTCode

Defense Contractors Highly Susceptible to Ransomware

Even as cybercriminals take aim at critical infrastructure, many of the United States’ top 100 federal contractors are inadequately prepared to repel ransomware attacks. These were among the findings of a report ...
Security Boulevard

Comply 2 Connect (C2C) – A Solution to Quell the Rogues in Our Midst

Have you ever taken a personal device to work and connected it to the work network? Maybe you connected to the Wi-Fi with a mobile device. Perhaps you brought in a personal laptop ...

If You Don’t Hire Robots to Attack Your Networks, You’re Not Doing Security Right

Complying with DoD’s new cybersecurity regulations requires hard data, the kind that pretty much requires automation to compile. The post If You Don’t Hire Robots to Attack Your Networks, You’re Not Doing ...

If You Don’t Hire Robots to Attack Your Networks, You’re Not Doing Security Right

Complying with DoD’s new cybersecurity regulations requires hard data, the kind that pretty much requires automation to compile. The post If You Don’t Hire Robots to Attack Your Networks, You’re Not Doing ...