Similar Posts
The Challenges of Printing CUI
As the Defense Department moves to more tightly control how Controlled Unclassified Information (CUI) is handled, contractors are going to need to deal with how documents that contain CUI such as drawings or deliverables are printed. Listen to this short explanation of what is going to be required. If you have questions, please contact us….
Protecting Website Security Question Answers
In light of the recent Callaway golf equipment vendor’s websites (multiple) breaches, which compromised security questions and answers, here is a simple tip to reduce your risk going forward from these breaches.
Managing Insider Threat
Cyber insider threat is a significant issue. It comes in multiple flavors – accidental and malicious and can be caused by IT or by general users. While relatively rare compared to ransomware, it is more common than you might think. Learn about the problem here. Audio Video
DoD’s New Instruction on Labelling Controlled Technical Information
Most defense contractors have been complaining about the lack of specificity of how to protect controlled technical information or CTI. DoD has just released instructions clarifying the rules around protecting CTI. Learn more here.
Security by Design – A Great Example
Recently the communications technology firm Twillio was hacked and a number of their customer’s accounts were compromised. Among those compromised was the account of the secure messaging app Signal. While this is not good, Signal spent a lot of effort baking in security by design. Learn about what they did and why those efforts towards…
Draft Kings Attack Recommendations
Some users of the sports betting site Draft Kings discovered that they were locked out of their betting account and, more importantly, their bank accounts were drained. Learn how this happened and what you can do to minimize this risk. Note that this is attack is not limited to Draft Kings or sports book sites….