Blog

Blog

Beyond Red vs. Blue: Bring on the Purple Team

What Is a Purple Team?In cybersecurity, a purple team is a group that combines offensive red team capabilities with defensive blue team insights to provide a truly collaborative, well-balanced security posture. “Purple teaming” is more than a work group; it should be a philosophy.If you’re familiar with offensive security, red and blue team structures are well known. To review:Red Teams: Perform...
Blog

The MedusaLocker ransomware gang is hiring penetration testers

MedusaLocker, the ransomware-as-a-service (RaaS) group that has been active since 2019 is openly recruiting for penetration testers to help it compromise more businesses. As Security Affairs reports, MedusaLocker has posted a job advert on its dark web leak site, which pointedly invites pentesters who already have direct access to corporate networks to make contact."If you don't have access,...
Blog

CMMC Compliance Checklist: Steps to Achieve Certification

CMMC is a cybersecurity standard implemented by the US Department of Defense to protect sensitive data within its supply chain. Use this checklist to help achieve certification.
Blog

What Is CUI Specified? Key Differences Explained

CUI Specified is info needing protection or control under specific laws, regulations, or government-wide policies.
Blog

What Is CUI Basic? Guidelines and Security Measures

Controlled Unclassified Information (CUI) is a sensitive data category that the United States federal government produces or interacts with.