All Articles
Brenda Harper • 29 Nov 2024
Is Your Office Bugged? Maybe Not, But…
A social engineer doesn’t need hidden devices to eavesdrop on you—they just need to get you to turn on a...
Brenda Harper • 18 Nov 2024
Are Your Subcontractors CMMC Compliant?
If your organization is a DoD prime contractor, ensuring your subcontractors meet CMMC compliance requirements will soon be mandatory. With...
Brenda Harper • 15 Nov 2024
Prime Demanded an SPRS Score. What Do I Do?
My Prime Demanded an SPRS Score… What Do I Do? First, don’t panic. This is becoming more common now that the...
cfyt3i • 11 Nov 2024
Are Your Subcontractors CMMC Compliant?
If your organization is a DoD prime contractor, ensuring your subcontractors meet CMMC compliance requirements will soon be mandatory. With...
Brenda Harper • 8 Nov 2024
Is It Really a USB Charging Cable?
What looks like a simple charging cable can actually be an advanced tool with a WiFi access point that can...
Brenda Harper • 3 Nov 2024
Artifact Hashing for CMMC
A hash is a unique, fixed-length string of characters that is generated by a mathematical algorithm for artifacts like files,...
Brenda Harper • 19 Oct 2024
CMMC – Self Assessments for Subcontractors
Will Subcontractors Be Able to Self-Assess Their Compliance with CMMC Level 2? Maybe… Under the CMMC program, prime contractors that are...
Brenda Harper • 18 Sep 2024
Corporate Espionage and Cybersecurity
Between 2013 and 2015, Ticketmaster employees, including a former employee of its competitor Songkick (formerly known as CrowdSurge), accessed proprietary...
Brenda Harper • 3 Mar 2024
Using Bluetooth Devices on Federal Contracts
Bluetooth should be avoided on systems doing any kind of work for the Federal government – DoD or civilian. When...