Phishing and spear phishing, i.e. social engineering, have rendered today’s users defenseless against increasingly sophisticated cyber-attacks. In 2016, the Director of National Intelligence (DNI) reported that 91% of all successful cyber-attacks against the Federal Government in 2015 were enabled by social engineering. In short, 91% of successful Read More
Topic: Compliance Validation
Phishing for Solutions: Are Cybersecurity Compliance Based Programs Working?

Phishing and spear phishing, i.e. social engineering, have rendered today’s users defenseless against increasingly sophisticated cyber-attacks. In 2016, the Director of National Intelligence (DNI) reported that 91% of all successful cyber-attacks against the Federal Government in 2015 were enabled by social engineering. In short, 91% of successful Read More
Configuration Management Compliance Validation
(.mil/.gov ONLY) The increasing technological sophistication of the Department of Defense (DoD) leads to a dependency on technology that, in turn, represents potentially crippling vulnerabilities. DoD is dependent upon advanced weapon systems and Command, Control, Communications, Computers, and Intelligence (C4I) systems throughout all mission areas from Read More