CMMC – The New DoD CyberSecurity Standard 
Authored by Jim Coleman
September 13, 2019

Cyber Maturity Model Certification Draft Version .6 Released Friday, November 8th…

Prowler: What it does, how we use it, and why you need it.
Authored by Ryan Brown
August 21, 2019

What is it? 

Prowler is an open source Amazon Web Services (AWS) “Security Best…

The Serious Business of DFARS Compliance
Authored by Joshua Griswell
August 08, 2019

A California U.S. district court ruled last week that allegations against Aerojet Rocketdyne…

AWS Root Account Best Practices
Authored by Joshua Griswell
July 20, 2019

“Our entire AWS account is gone. The call center is down, we can’t log in - it’s like it never existed! How do we…

Robbinhood: Prince of Ransomware
Authored by
June 11, 2019

As some things from our childhood, things aren’t always as they appear.

With what we…

Why Am I Getting So Much Spam?
Authored by Joshua Griswell
April 23, 2019

An Intro To Email Bombs

You’re working quietly at your desk and suddenly start getting emails. Lots, and…

Department of Defense Goal is to Streamline Enforcement for DFARS 7012 Compliance
Authored by Gary Daemer
February 25, 2019

Department of Defense (DoD) may seek to outsource it’s supply chain cybersecurity audits by allowing organizations…