Narrowing Focus in Forensic Investigation

An incident responder is a storyteller. We tell the story of an attack sequence by gradually uncovering artifacts and in …

Read Story

4 min read
2024 | 02

From Zero to One: A Threat Hunting Training Montage (Part 1)

Welcome to the wonderful world of threat hunting! This is the first in a series of blog posts where we’ll walk through h …

Read Story

3 min read
2024 | 01

Writing Effective Policies and Procedures for CMMC

During a CMMC journey, the self-assessor must meet objective requirements using “specifications”. Specifications are doc …

Read Story

3 min read
2024 | 01

Cybersecurity Wake-Up: APT33's Latest Salvo Sparks Urgency in DIB Defenses

In the ever-evolving landscape of cyber threats, recent revelations by Microsoft have once again reminded us of the dang …

Read Story

2 min read
2024 | 01

CMMC Timeline Update

With today's publication of the Cybersecurity Maturity Model Certification’s (CMMC) proposed rule, a 60-day public comme …

Read Story

1 min read
2023 | 12

The CMMC Skillset for Success

The first M in the CMMC assessment framework stands for maturity, and that's exactly what is needed to get through a sel …

Read Story

4 min read
2023 | 12
RADlabs logo
Perspectives, insights, and education from our founders and vSOC team.

Subscribe the the RADICL Labs Blog: