Anders Erickson on Cutting CMMC Scope from 70 Licenses to 3

Anders Erickson on Cutting CMMC Scope from 70 Licenses to 3

Feb 04, 2026 1 min read
Jacob Andra on Why AI Czars Need Systems Optimization over Pure Tech Focus

Jacob Andra on Why AI Czars Need Systems Optimization over Pure Tech Focus

Jan 28, 2026 1 min read
Daryan Dehghanpisheh on Extending Vulnerability Management to AI

Daryan Dehghanpisheh on Extending Vulnerability Management to AI

Jan 23, 2026 1 min read
Trevor Scott on Using Defense Tradeshows to Discover Opportunities

Trevor Scott on Using Defense Tradeshows to Discover Opportunities

Jan 15, 2026 1 min read
Jake Bodily on Why Speed Requirements Can Kill Tech Adoption

Jake Bodily on Why Speed Requirements Can Kill Tech Adoption

Jan 14, 2026 1 min read
Romney Williams on Converting Introductions into Programs of Record

Romney Williams on Converting Introductions into Programs of Record

Jan 08, 2026 1 min read

THE DIB CYBERSECURITY MATURITY REPORT 2025 EDITION

Read Full Report
RADICL_ DIB Report_Part 5

Regulatory Compliance

Read More  
CMMC Compliance Deadline 2026: Key Dates That Affect Your DoD Contract

CMMC Compliance Deadline 2026: Key Dates That Affect Your DoD Contract

Apr 13, 2026 6 min read
CMMC Readiness Assessment: 7 Top Compliance Mistakes That Delay Readiness

CMMC Readiness Assessment: 7 Top Compliance Mistakes That Delay Readiness

Apr 13, 2026 9 min read
Top NIST 800-171 Compliance Services Providers (2026)

Top NIST 800-171 Compliance Services Providers (2026)

Mar 27, 2026 10 min read

Threat Hunting & Intelligence

Read More  
Multi‑Stage VBScript Malware Analysis
This is a detailed breakdown of a malicious VBS script discovered on an endpoint within RADICL’s customer base as a result of RADICL’s custom EDR detection logic. The script executes a multi-stage attack designed to achieve persistence, evade detection, and deploy a secondary payload.

Multi‑Stage VBScript Malware Analysis

Jul 23, 2025 7 min read
Unmasking the Toy Maker Initial Access Broker
An initial access broker is a type of threat actor specializing in gaining initial persistent access to an environment.

Unmasking the Toy Maker Initial Access Broker

May 20, 2025 2 min read
Too Good To Be True
In this campaign, Lazarus Group tricks a user into running a malicious script on their machine by having them apply for a job that is just a little too good to be true.

Too Good To Be True

May 01, 2025 3 min read

Industry Analysis

Read More  
David Dickey on Scaling Defense Tech Hiring

David Dickey on Scaling Defense Tech Hiring

Apr 30, 2026 1 min read
Jonathan Slavik on Payload Handoffs in Hours, Not Months

Jonathan Slavik on Payload Handoffs in Hours, Not Months

Apr 23, 2026 1 min read
Jackson Moses on Why Dual Use Is a Dirty Word in Defense Tech

Jackson Moses on Why Dual Use Is a Dirty Word in Defense Tech

Apr 16, 2026 1 min read

Incident Response

Read More  
What Are Incident Response Solutions?

What Are Incident Response Solutions?

Apr 13, 2026 7 min read
A Day in the Life: Our vSOC Responds to the CrowdStrike Incident
On the evening of 7/25/24, CrowdStrike pushed a content update which caused Windows systems to crash and/or enter a reboot loop, rendering the systems unusable.

A Day in the Life: Our vSOC Responds to the CrowdStrike Incident

Jul 24, 2024 2 min read
I Spy a Ransomware Attack
Ransoming an espionage victim carries several advantages that can make it an ideal move for nation-state threat actors.

I Spy a Ransomware Attack

Jul 16, 2024 2 min read

Attack Surface & Vulnerability Management

Read More  
Iranian APT Actors Are Targeting Your PLCs — Here's What to Do
There was a joint advisory this week (AA26-097A) warning of active exploitation of internet-facing Programmable Logic Controllers (PLCs).

Iranian APT Actors Are Targeting Your PLCs — Here's What to Do

Apr 09, 2026 2 min read
CMMC Enclave: What It Is, When It Works, and How to Build the Right Compliance Boundary

CMMC Enclave: What It Is, When It Works, and How to Build the Right Compliance Boundary

Mar 26, 2026 11 min read
Daryan Dehghanpisheh on Extending Vulnerability Management to AI

Daryan Dehghanpisheh on Extending Vulnerability Management to AI

Jan 23, 2026 1 min read

Security Operations & vSOC

Read More  
Top SOC Service Providers (SOCaaS) for 2026

Top SOC Service Providers (SOCaaS) for 2026

Mar 26, 2026 11 min read
Best MDR Providers for Regulated Industry & DIB Contractors (2026)

Best MDR Providers for Regulated Industry & DIB Contractors (2026)

Mar 12, 2026 16 min read

Operational Resilience

Read More  
Cyber Resilience at the Crossroads

Cyber Resilience at the Crossroads

Apr 10, 2025 2 min read
Ep 1: Charles McCarrick on Innovation and Opportunity in the DIB
Micro-Ant's Charles McCarrick on Innovation and Opportunity in the DIB

Ep 1: Charles McCarrick on Innovation and Opportunity in the DIB

Dec 08, 2023 2 min read

The DIB Innovators

Celebrating the brilliant minds driving innovation in the Defense Industrial Base. Join host David Graff as he speaks with DIB leaders championing our nation’s security and shaping the future of defense technology.

EP 97 — Teague's Matt McElvogue on Why Operators Stop Trusting the Tech & Start Working Around It

EP 97 — Teague's Matt McElvogue on Why Operators Stop Trusting the Tech & Start Working Around It

May 12, 2026 1 min read
David Dickey on Scaling Defense Tech Hiring

David Dickey on Scaling Defense Tech Hiring

Apr 30, 2026 1 min read
Jonathan Slavik on Payload Handoffs in Hours, Not Months

Jonathan Slavik on Payload Handoffs in Hours, Not Months

Apr 23, 2026 1 min read