Category: Government IT

  • Understanding Data Disposal: A Key to Data Privacy

    Data disposal, a critical component of information lifecycle management, involves the processes and methods used to permanently remove or delete data from digital storage devices. This practice is essential in managing data securely, ensuring that once data is no longer required, it cannot be recovered or misused. Data disposal works by overwriting the original data…

  • Analyzing the DirtyMoe and STEADY#URSA Attack on Ukrainian Infrastructure

    Ukraine has found itself at the center of a sophisticated cyber-attack campaign, where over 2,000 computers have been compromised by the malware strain known as DirtyMoe. This malicious software, active since 2016, is notorious for its capabilities in executing cryptojacking and distributed denial-of-service (DDoS) attacks. The Computer Emergency Response Team of Ukraine (CERT-UA) attributes these…

  • Overview: Phish Tale of the Week Often times phishing campaigns, created by malicious actors, target users by utilizing social engineering. For example, in this text message, the actors are appearing as Netflix and informing you that action needs to be taken regarding your payment method on your account. The message politely explains that our account…

  • CISA Launches New Pilot Program to Bolster Cybersecurity in Critical Infrastructure Sectors

    The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has taken a significant step towards enhancing the cybersecurity posture of the nation’s critical infrastructure sectors. The agency has announced the launch of an innovative pilot program, aimed at extending cutting-edge cybersecurity shared services to critical infrastructure entities, especially those most in need of such support. This…

  • FBI Warns Network Defenders About new Dual Ransomware Attack Pattern

    The FBI recently released a PIN (Private Industry Notification) in order to “highlight emerging ransomware trends,” in this case “dual ransomware attacks,” a type of attack that targets the same organization twice with two different types of ransomware, resulting in a significantly more encrypted system for the victims. A dual ransomware attack is classified by…

  • The Difference Between CMMC and DFARS CUI

    Although DFARS CUI compliance and CMMC programs do overlap, the assessment (audit) process will be significantly different moving forward

  • The Key to Compliance: Vulnerability Assessments

    Routine vulnerability assessments evaluate what risks and threats exist for your business systems, assign severity levels to them, and ultimately recommend modifications or countermeasures to minimize the risk of a breach.

  • U.S. and U.K. Warn of Cybersecurity Threat From Russia

    LONDON — The United States and Britain on Monday issued a first-of-its-kind joint warning about Russian cyberattacks against government and private organizations as well as individual homes and offices in both countries, a milestone in the escalating use of cyberweaponry between major powers. Read More………

  • The 5 non-cyber challenges facing federal cybersecurity

    Cybersecurity may be the top issue keeping federal CIOs, CISOs and other IT officials up at night — but it doesn’t exist in a vacuum alone. In addition to strong cybersecurity risk awareness and mitigation policies, as well as state-of-the-art threat detection software, agencies must also equip themselves with top talent, modern systems, efficient procurement…

  • OPM Spent Less Than Nearly All Other Federal Agencies on Cybersecurity

    THE FEDERAL AGENCY that stored, and lost, millions of current and former government employees’ sensitive files, fingerprints, and security clearances spent only a small fraction of what other federal agencies allocated for cybersecurity, according to a new report published by the House Oversight and Government Reform Committee on Wednesday. The Office of Personnel Management breach,…