Similar Posts
The Challenges of Printing CUI
ByadminAs the Defense Department moves to more tightly control how Controlled Unclassified Information (CUI) is handled, contractors are going to need to deal with how documents that contain CUI such as drawings or deliverables are printed. Listen to this short explanation of what is going to be required. If you have questions, please contact us….
DoD’s New Instruction on Labelling Controlled Technical Information
ByadminMost defense contractors have been complaining about the lack of specificity of how to protect controlled technical information or CTI. DoD has just released instructions clarifying the rules around protecting CTI. Learn more here.
A Secure Replacement for Passwords
ByadminPasskeys will ultimately replace passwords. How soon is unclear because 2 billion websites need to be upgraded to support it and the vendors still have some kinks to work out. But it will happen and you need to learn about it and start playing with it. Learn more here:
Cryptocurrency is Ripe for Cyberattacks
ByadminCryptocurrency is basically a very sophisticated IT infrastructure. One that is not regulated very much and one which can have devastating financial impact to people if it is compromised. And it is being compromised daily. Don’t bring a spoon to a fork fight – learn what some of the risks are so you can better…
- CMMC | Compliance | DIB | DoD | IT Infrastructure | Legal | Privacy | Security News Update | User tips
Security News Update for April 20, 2025
ByadminSecurity News Update for April 20, 2025 This week’s news includes:
Security by Design – A Great Example
ByadminRecently the communications technology firm Twillio was hacked and a number of their customer’s accounts were compromised. Among those compromised was the account of the secure messaging app Signal. While this is not good, Signal spent a lot of effort baking in security by design. Learn about what they did and why those efforts towards…