Temu App Poses Potential Data Risk for Consumers
by Nicholas Foisy on June 30, 2023 at 11:00 AM
The modern world is governed by apps. From communication to e-commerce, every aspect of our lives seems to be tied to digital platforms that promise convenience at the touch of a button. Among these apps, a newcomer has garnered significant attention lately.
Businesses Can Learn From the Classified Pentagon Leak
by Jake Dwares on April 14, 2023 at 4:30 PM
On April 14th, 2023, 21-year-old Massachusetts Air National Guardsman Jack Teixeira appeared in federal court, accused of leaking classified documents in a Discord group titled “Thug Shaker Central”. Facing charges under the 1917 Espionage Act, Jack is looking at potential decades in …
Flight Troubles & Business Continuity Planning
by Jake Dwares on January 11, 2023 at 4:15 PM
This morning, the Federal Aviation Administration’s (FAA) system for alerting pilots and airports of real-time hazards, called NOTAM (Notice to Air Missions), went offline around 3:28AM EST. While flights have slowly resumed to normalcy, this recent event is a further example of a bre …
What Does It Mean to Be CJIS Compliant?
by Kelly O’Brien on December 1, 2022 at 3:00 PM
If your organization is involved with government entities and operations, chances are you have heard of Criminal Justice Information Services (CJIS) compliance. The term is commonly used in law enforcement but can also apply to civil entities.
Recommendations from CISA's Recent “Shields Up” Warning
by Jesse Roberts on March 10, 2022 at 2:00 PM
On February 26th, 2022, the U.S. Cybersecurity & Infrastructure Security Agency (CISA) issued immediate Shields Up actions for organizations to take in response to the ongoing conflict with Russia. The basic guidelines are as follows:
An Introduction to CMMC Compliance
by Kyle Daun on September 30, 2021 at 1:00 PM
On January 31st, 2020, the Department of Defense (DoD) announced the release of the Cybersecurity Maturity Model Certification (CMMC), a framework aimed at assessing and enhancing the cybersecurity posture of the Defense Industrial Base (DIB), as it relates to Controlled Unclassified …