Attila Security Blog

01 05, 2020

    COVID-19 (Coronavirus) & Cybersecurity: Telecommuting and Remote Work Security FAQs

    By | | Categories: Enterprise, Government, byod, Security, CMMC, remote work, captive portal, vdi

    Our country finds itself in a completely unprecedented situation as we struggle to figure out how to best respond to the spread of COVID-19. [...]

    27 04, 2020

      Why VDI is the Future of Remote Work for Government

      By | | Categories: Government, remote work

      In recent years, the government has become increasingly aware of the need to support remote work, and our inability to achieve remote work at the levels necessitated by the current global situation has shined a very strong light on the current gaps. [...]

      04 03, 2020

        How to have employees work from home securely during the Coronavirus outbreak

        By | | Categories: Enterprise, Government, Blog, Security, mobile security

        The Coronavirus, or COVID-19, has many organizations sending employees to work from home to ensure their safety and the health of their employee population. As the virus continues to spread, organizations across the world will likely see continued. [...]

        12 02, 2020

          What Is CMMC? A Primer for Defense Industrial Base (DIB) Contractors

          By | | Categories: Military, Government, Uncategorized

          After months of anticipation, the Department of Defense’s (DoD) new Cybersecurity Maturity Model Certification (CMMC) was published on January 30. Under the current timeline, CMMC requirements will begin to appear in DoD Requests for Information. [...]

          20 12, 2019

            Compliance Challenges Facing Government Contractors

            By | | Categories: Government, Blog, Security, Supply Chain

            In the United States Defense Industrial Base (DIB), government contracts are rarely fulfilled by one organization alone. Generally, a primary contractor bids on a project in partnership with a team of subcontractors, each of which provides specific. [...]

            20 11, 2019

              Potential Fines on Prime Contractors for Subcontractor Data Breaches

              By | | Categories: Government, Blog, Security, Supply Chain

              Defense contractors have been victims of a series of high-profile data breaches in recent years.  Interestingly, the prime contractor on a Department of Defense (DoD) contract is often not the direct cause of the data breach. Most prime contractors. [...]

              22 07, 2019

                Implications of the DoD’s Cybersecurity Maturity Model Certification

                By | | Categories: Information Security, Government, Blog

                [fusion_builder_container hundred_percent="no" equal_height_columns="no" menu_anchor="" hide_on_mobile="small-visibility,medium-visibility,large-visibility" class="" id="" background_color="" background_image="" background_position="center center". [...]

                15 02, 2019

                  The Dangers Of Foreign Made VPNs

                  By | | Categories: Information Security, Government

                  On the heels of the recent Huawei scandal, lawmakers and cybersecurity experts alike are increasingly alarmed regarding the dangers of foreign virtual private networks (VPNs) . On February 7, 2019, Senators Marco Rubio and Ron Wyden penned a letter. [...]

                  18 01, 2019

                    Cyber Concerns For The Satellite Sector

                    By | | Categories: Information Security, Enterprise, Government, Supply Chain

                    According to the Index of Objects Launched into Outer Space maintained by the United Nations Office for Outer Space Affairs (UNOOSA), as of mid-2018 there were 792 communications satellites orbiting the earth and several hundreds of others used for. [...]

                    03 01, 2019

                      The Surprising Role Of AI In Cybercrime

                      By | | Categories: Information Security, Enterprise, Government

                      Artificial Intelligence (AI), or machine learning, is changing the technological landscape. As computers “learn” and make smarter “decisions”, response times become faster and efficiency and productivity increase. In the world of cybersecurity, AI. [...]

                      subscribe_to_blog

                      Subscribe me to: