mad security blog
Find the most up-to-date trends, insights, and information on the cybersecurity industry
read our latest posts
Our Blog
Navigating the Updates in NIST SP 800-171 Revision 3
NIST Special Publication (SP) 800-171 has been updated from Revision 2 to Revision 3 after over…
Assessing and Mitigating Supply Chain Cybersecurity Risks for Defense Contractors
Introduction Supply chain cybersecurity is a significant concern for defense contractors, as vulnerabilities within the supply…
Understanding DFARS 7024: A Comprehensive Guide for Defense Contractors
Introduction As defense contractors, staying updated on cybersecurity regulations is crucial to protect sensitive information and…
Protecting Critical Data in the Defense Industry: A Comprehensive 5-Step Guide for DIB Companies
5 Steps for Defense Industry Base Companies to Effectively Protect Their Critical Data As a Defense…
8 Best Practices for Managing Cyber Risk
Tips and Examples for a Secure Organization Managing cyber risk must be a top priority…
Strengthening Cybersecurity in the Defense Industry
A Comprehensive Approach to Tackling Top Threats The defense industry plays a critical role in maintaining…
Overcome Lack of Cybersecurity Expertise by Partnering with an MSSP
In the modern, technology-driven landscape, partnering with an MSSP (Managed Security Service Provider) has become essential…
How MAD Security Monitors Key Windows Event IDs to Keep Your Business Safe
Using Windows Events IDs During Cybersecurity Monitoring Cybersecurity threats are becoming increasingly sophisticated, making it crucial…
Why Outsourcing Cybersecurity to a Managed Security Service Provider (MSSP) is a Smart Move for Government and Defense Contractors
Government and defense contractors handle sensitive information and are at a higher risk of cyber-attacks. In-house…
Choosing A Cybersecurity Provider As A Government Contractor
Government contractors are often contacted by companies that provide cybersecurity services. It is also common for…
How Do I Choose A Cybersecurity Service Provider?
As businesses become increasingly dependent on technology, they also reach out to new service providers that…
Common Confusion between Patch and Vulnerability Management in CMMC Compliance
A common misconception is that patch management equates to vulnerability management. At MAD Security, this confusion…
MAD Security Partners with OpenText Response to improve response time to cyber threats and shrink the attack surface
Building network detection and response capabilities into MAD Security’s managed security service offering protects sensitive government…
MAD SECURITY NAMED TO MSSP ALERT’S TOP 250 MSSPS LIST FOR 2022
Sixth-Annual List & Research Identifies Leading Managed Security Service Providers Worldwide October 3, 2022, Huntsville AL:…
Optimizing SOC to Meet CMMC Compliance and Strengthen Cybersecurity: A Case Study
As cybersecurity threats rise and defense contractors face what can feel like ever-changing government compliance requirements,…
Today's Cyber Vulnerabilities to DOD Systems May Include These Top Risks
Cyber vulnerabilities to DOD Systems may include many risks that CMMC compliance addresses. Here are today's…
What DOD Contractors Need to Know About CMMC 2.0 and CIS-18
CMMC 2.0 and CIS-18 likely have many DOD Contractors within the Defense Industrial Base (DIB) feeling…
Six Reasons to have a Penetration Test Performed
A penetration test, commonly referred to as a pen test, is an authorized and coordinated simulated…
So You Have A Cyber Insurance Policy...But Are You Really Covered?
Cybercrime is a growing concern for companies, small and large alike. The levels of fraud and…
MAD Security Named to MSSP Alert's Top 250 MSSPs List for 2021
Fifth–Annual List Honors Leading MSSP, MDR and SOCaaS Cybersecurity Companies Worldwide September 22, 2021, Huntsville, AL:…
Capital One Data Breach
By: Montgomery Steen, Security Analyst, MAD Security | August 7, 2019 Overview: Capital One has disclosed…
The Future of DFARs – Maturity and Accreditation
By: Dave Stewart, Director of Governance, Risk, & Compliance (GRC), MAD Security | July 9, 2019…
Cyber Security Impacts of Financial Institution Organic Growth Strategies
By: Alex Shanteau, Security Engineer, MAD Security | June 27, 2019 When assessing growth strategies, it’s…
New Technology Implementations for Financial Institutions
By: Alex Shanteau, Security Engineer, MAD Security | March 28, 2019 A never-ending war is being…
Mobile Security Defenses
By: Jeremy Klinzak, Security Engineer, MAD Security | February 7, 2019 Mobile device security is an…
Ransomware Defenses
By: Scott Busby, Security Engineer, MAD Security | February 1, 2019 The name ransomware comes from a not…
Best Practices for Managing Software Vulnerabilities
By: Chris Roth, Security Engineer, MAD Security | January 24, 2019 Software vulnerabilities provide one of the…
Phishing Protections
By: Will Young, Director of Technical Testing, MAD Security | January 10, 2019 Protecting users from…
4 Common Cybersecurity Threats
By: Alex Shanteau, Senior Security Consultant, MAD Security | January 3, 2019 As the untamed cyber threat…
The Marriott Breach: Lessons Learned for the Hotel Industry
By: Alex Shanteau, Senior Security Consultant, MAD Security | December 19, 2018 The massive breach of…