Similar Posts
Security by Design – A Great Example
Recently the communications technology firm Twillio was hacked and a number of their customer’s accounts were compromised. Among those compromised was the account of the secure messaging app Signal. While this is not good, Signal spent a lot of effort baking in security by design. Learn about what they did and why those efforts towards…
The Challenges of Printing CUI
As the Defense Department moves to more tightly control how Controlled Unclassified Information (CUI) is handled, contractors are going to need to deal with how documents that contain CUI such as drawings or deliverables are printed. Listen to this short explanation of what is going to be required. If you have questions, please contact us….
Add 20-30 Points to Your SPRS Score
For those of you who are DoD contractors (and even if you are not), here is one thing that you can do that will improve your security program and, if you are a DoD contractor, will add 20 or more points to your NIST SP 800-171 SPRS Score. Audio Video
Managing Insider Threat
Cyber insider threat is a significant issue. It comes in multiple flavors – accidental and malicious and can be caused by IT or by general users. While relatively rare compared to ransomware, it is more common than you might think. Learn about the problem here. Audio Video
DoD’s New Instruction on Labelling Controlled Technical Information
Most defense contractors have been complaining about the lack of specificity of how to protect controlled technical information or CTI. DoD has just released instructions clarifying the rules around protecting CTI. Learn more here.
Security News Update for April 20, 2025
Security News Update for April 20, 2025 This week’s news includes: