FBI CyberCrime – What Businesses Should Know

Source: FBI Business and Industry: Partners in Our Cyber Mission The FBI’s cyber mission is to impose risk and consequences on our cyber adversaries through our unique authorities and world-class investigative capabilities. The success of that mission depends on partnerships—those we have with law enforcement and intelligence agencies worldwide and those we have and continue to build…

CMMC 101: Experts Share Advice On Self-Assessments

Source: National Defense Industrial Association CMMC 101: Experts Share Advice On How to Conduct Level 1 Self-Assessment While the Defense Department’s Cybersecurity Maturity Model Certification program has yet to be fully implemented, defense contractors are working through the complex process of conducting a Level 1 self-assessment, referred to by experts as “basic cyber hygiene.” The…

NIST Offers 19 Ways to Build Zero Trust Architectures

Source: NIST NIST Offers 19 Ways to Build Zero Trust Architectures If you’re trying to secure your organization’s computer network from cyberattacks, traditional approaches may not work. Gone are the days when you could keep all your electronic assets inside a single building and construct a firewall between them and the wider internet. Now you…

Chinese Hackers Turn Smartphones into ‘Security Crisis’

Source: Associated Press Chinese hackers and user lapses turn smartphones into a ‘mobile security crisis’ Cybersecurity investigators noticed a highly unusual software crash — it was affecting a small number of smartphones belonging to people who worked in government, politics, tech and journalism. The crashes, which began late last year and carried into 2025, were…