From Zero to One: A Threat Hunting Training Montage (Part 1)
Welcome to the wonderful world of threat hunting! This is the first in a series of blog posts where we’ll walk through h …
Writing Effective Policies and Procedures for CMMC
During a CMMC journey, the self-assessor must meet objective requirements using “specifications”. Specifications are doc …
Cybersecurity Wake-Up: APT33's Latest Salvo Sparks Urgency in DIB Defenses
In the ever-evolving landscape of cyber threats, recent revelations by Microsoft have once again reminded us of the dang …
CMMC Timeline Update
With today's publication of the Cybersecurity Maturity Model Certification’s (CMMC) proposed rule, a 60-day public comme …
The CMMC Skillset for Success
The first M in the CMMC assessment framework stands for maturity, and that's exactly what is needed to get through a sel …
EP 1 — Micro-Ant's Charles McCarrick on Innovation and Opportunity in the DIB
We are thrilled to announce the launch of our brand-new podcast, DIB Innovators. This show is more than just a series of …
Ransomware Meets Regulation: BlackCat Gang's Attack on MeridianLink
In a surprising twist the week before Thanksgiving, the infamous BlackCat ransomware gang took a bold step by filing a c …
RADICL Unveiled
In the spring of 2021, Matt, Dave, and I kicked off RADICL with the fundamental goal of building a better future when it …

