mad security blog

Find the most up-to-date trends, insights, and information on the cybersecurity industry

read our latest posts
Our Blog
Navigating the Updates in NIST SP 800-171 Revision 3 

Navigating the Updates in NIST SP 800-171 Revision 3 

NIST Special Publication (SP) 800-171 has been updated from Revision 2 to Revision 3 after over…
Assessing and Mitigating Supply Chain Cybersecurity Risks for Defense Contractors

Assessing and Mitigating Supply Chain Cybersecurity Risks for Defense Contractors

Introduction Supply chain cybersecurity is a significant concern for defense contractors, as vulnerabilities within the supply…
Understanding DFARS 7024: A Comprehensive Guide for Defense Contractors 

Understanding DFARS 7024: A Comprehensive Guide for Defense Contractors 

Introduction As defense contractors, staying updated on cybersecurity regulations is crucial to protect sensitive information and…
Protecting Critical Data in the Defense Industry: A Comprehensive 5-Step Guide for DIB Companies

Protecting Critical Data in the Defense Industry: A Comprehensive 5-Step Guide for DIB Companies

5 Steps for Defense Industry Base Companies to Effectively Protect Their Critical Data  As a Defense…
8 Best Practices for Managing Cyber Risk

8 Best Practices for Managing Cyber Risk

  Tips and Examples for a Secure Organization Managing cyber risk must be a top priority…
Strengthening Cybersecurity in the Defense Industry

Strengthening Cybersecurity in the Defense Industry

A Comprehensive Approach to Tackling Top Threats  The defense industry plays a critical role in maintaining…
Overcome Lack of Cybersecurity Expertise by Partnering with an MSSP

Overcome Lack of Cybersecurity Expertise by Partnering with an MSSP

In the modern, technology-driven landscape, partnering with an MSSP (Managed Security Service Provider) has become essential…
How MAD Security Monitors Key Windows Event IDs to Keep Your Business Safe

How MAD Security Monitors Key Windows Event IDs to Keep Your Business Safe

Using Windows Events IDs During Cybersecurity Monitoring Cybersecurity threats are becoming increasingly sophisticated, making it crucial…
Why Outsourcing Cybersecurity to a Managed Security Service Provider (MSSP) is a Smart Move for Government and Defense Contractors

Why Outsourcing Cybersecurity to a Managed Security Service Provider (MSSP) is a Smart Move for Government and Defense Contractors

Government and defense contractors handle sensitive information and are at a higher risk of cyber-attacks. In-house…
Choosing A Cybersecurity Provider As A Government Contractor

Choosing A Cybersecurity Provider As A Government Contractor

Government contractors are often contacted by companies that provide cybersecurity services. It is also common for…
How Do I Choose A Cybersecurity Service Provider?

How Do I Choose A Cybersecurity Service Provider?

As businesses become increasingly dependent on technology, they also reach out to new service providers that…
Common Confusion between Patch and Vulnerability Management in CMMC Compliance 

Common Confusion between Patch and Vulnerability Management in CMMC Compliance 

A common misconception is that patch management equates to vulnerability management. At MAD Security, this confusion…
MAD Security Partners with OpenText Response to improve response time to cyber threats and shrink the attack surface

MAD Security Partners with OpenText Response to improve response time to cyber threats and shrink the attack surface

Building network detection and response capabilities into MAD Security’s managed security service offering protects sensitive government…
MAD SECURITY NAMED TO MSSP ALERT’S TOP 250 MSSPS LIST FOR 2022

MAD SECURITY NAMED TO MSSP ALERT’S TOP 250 MSSPS LIST FOR 2022

Sixth-Annual List & Research Identifies Leading Managed Security Service Providers Worldwide  October 3, 2022, Huntsville AL:…
Optimizing SOC to Meet CMMC Compliance and Strengthen Cybersecurity: A Case Study

Optimizing SOC to Meet CMMC Compliance and Strengthen Cybersecurity: A Case Study

As cybersecurity threats rise and defense contractors face what can feel like ever-changing government compliance requirements,…
Today's Cyber Vulnerabilities to DOD Systems May Include These Top Risks

Today's Cyber Vulnerabilities to DOD Systems May Include These Top Risks

Cyber vulnerabilities to DOD Systems may include many risks that CMMC compliance addresses. Here are today's…
What DOD Contractors Need to Know About CMMC 2.0 and CIS-18

What DOD Contractors Need to Know About CMMC 2.0 and CIS-18

CMMC 2.0 and CIS-18 likely have many DOD Contractors within the Defense Industrial Base (DIB) feeling…
Six Reasons to have a Penetration Test Performed

Six Reasons to have a Penetration Test Performed

A penetration test, commonly referred to as a pen test, is an authorized and coordinated simulated…
<strong>So You Have A Cyber Insurance Policy...But Are You Really Covered?</strong>

So You Have A Cyber Insurance Policy...But Are You Really Covered?

Cybercrime is a growing concern for companies, small and large alike. The levels of fraud and…
MAD Security Named to MSSP Alert's Top 250 MSSPs List for 2021

MAD Security Named to MSSP Alert's Top 250 MSSPs List for 2021

Fifth–Annual List Honors Leading MSSP, MDR and SOCaaS Cybersecurity Companies Worldwide September 22, 2021, Huntsville, AL:…
Capital One Data Breach

Capital One Data Breach

By: Montgomery Steen, Security Analyst, MAD Security | August 7, 2019 Overview: Capital One has disclosed…
The Future of DFARs – Maturity and Accreditation

The Future of DFARs – Maturity and Accreditation

By: Dave Stewart, Director of Governance, Risk, & Compliance (GRC), MAD Security | July 9, 2019…
Cyber Security Impacts of Financial Institution Organic Growth Strategies

Cyber Security Impacts of Financial Institution Organic Growth Strategies

By: Alex Shanteau, Security Engineer, MAD Security | June 27, 2019 When assessing growth strategies, it’s…
New Technology Implementations for Financial Institutions

New Technology Implementations for Financial Institutions

By: Alex Shanteau, Security Engineer, MAD Security | March 28, 2019 A never-ending war is being…
Mobile Security Defenses

Mobile Security Defenses

By: Jeremy Klinzak, Security Engineer, MAD Security | February 7, 2019 Mobile device security is an…
Ransomware Defenses

Ransomware Defenses

By: Scott Busby, Security Engineer, MAD Security | February 1, 2019 The name ransomware comes from a not…
Best Practices for Managing Software Vulnerabilities

Best Practices for Managing Software Vulnerabilities

By: Chris Roth, Security Engineer, MAD Security | January 24, 2019 Software vulnerabilities provide one of the…
Phishing Protections

Phishing Protections

By: Will Young, Director of Technical Testing, MAD Security | January 10, 2019 Protecting users from…
4 Common Cybersecurity Threats

4 Common Cybersecurity Threats

By: Alex Shanteau, Senior Security Consultant, MAD Security | January 3, 2019 As the untamed cyber threat…
The Marriott Breach: Lessons Learned for the Hotel Industry

The Marriott Breach: Lessons Learned for the Hotel Industry

By: Alex Shanteau, Senior Security Consultant, MAD Security | December 19, 2018 The massive breach of…