Cyber News 公開
[search 0]
もっと
Download the App!
show episodes
 
Artwork

1
CMMC News by Jun Cyber

Wilson Bautista Jr.

icon
Unsubscribe
icon
Unsubscribe
ウィークリー+
 
This podcast is dedicated for those who want to stay up to date with the Cybersecurity Maturity Model Certification news. It utilizes Notebook LM to synthesize news articles from Jun Cyber's blog as well as other official CMMC documentation and produces a podcast. Podcast Description Disclaimer: The content presented in CMMC News is generated by AI and is intended for informational and educational purposes only. It should not be taken as official guidance for Cybersecurity Maturity Model Cer ...
  continue reading
 
This Cyber Security podcast is intended to help people better protect themselves from Cyber criminals by offering quick tips, hacking news summaries and interviews with industry professionals. USB our Guest is the cyber security podcast you have been looking for. Offering quick tips and attack overviews 5-10 minutes in length intended to help people better protect themselves from Cyber criminals and 1-2hr interviews with industry professionals. From 2FA to Zero-Days and everything in between ...
  continue reading
 
Loading …
show series
 
Send us a text In this episode of CMMC News, host Wilson Bautista Jr. breaks down the crucial factors to consider when choosing a CMMC consultant. He outlines five essential criteria: ensuring proper CMMC certification, verifying real audit experience, evaluating communication skills, determining consultation needs (assessment vs. implementation), …
  continue reading
 
Send us a text Welcome to another episode of CMMC News! Today, we're simplifying the complexities of cybersecurity compliance, specifically diving into how to choose the right Certified Third Party Assessment Organization (C3PAO) to guide your organization to CMMC compliance. I'm your host, Wilson Bautista Jr., and in this episode, we'll break down…
  continue reading
 
Send us a text A Department of Defense Inspector General audit (DODIG-2025-056) revealed that the Department of Defense (DoD) inadequately implemented its process for authorizing third-party organizations to conduct Cybersecurity Maturity Model Certification (CMMC) 2.0 assessments. The audit found that the DoD failed to ensure all required steps we…
  continue reading
 
Send us a text Representative Gary Palmer introduced a resolution to overturn a Pentagon rule establishing the Cybersecurity Maturity Model Certification (CMMC) program. This Congressional Review Act resolution aims to allow Congress a vote on significant regulatory actions. The Department of Defense completed the necessary steps to implement the C…
  continue reading
 
Send us a text This memorandum from the Department of Defense outlines requirements for cloud service providers (CSPs) seeking FEDRAMP Moderate equivalency. It details the necessary assessments and documentation, including security plans and testing procedures, that CSPs must meet. The memorandum emphasizes the importance of compliance with specifi…
  continue reading
 
Send us a text In this episode of CMMC News, we provide an in-depth overview of the Cybersecurity Maturity Model Certification (CMMC), the Department of Defense’s framework for enhancing the cybersecurity posture of contractors and subcontractors. We explore the three maturity levels and their requirements, which are derived from FAR 52.204-21, NIS…
  continue reading
 
Send us a text In this episode of CMMC News, we unpack the Level 1 Cybersecurity Maturity Model Certification (CMMC) Assessment Guide, designed to help organizations self-assess their compliance with 15 basic cybersecurity requirements for protecting Federal Contract Information (FCI). We cover key aspects of the guide, including how to define the …
  continue reading
 
Send us a text In this episode of CMMC News, we explore the Cybersecurity Maturity Model Certification (CMMC) Assessment Guide for Level 2, Version 2.13. This comprehensive guide provides instructions for conducting both self-assessments and certification assessments, detailing security requirements across key domains like access control, awareness…
  continue reading
 
Send us a text In this episode of CMMC News, we dive into the guidance for defining the scope of a Level 3 Cybersecurity Maturity Model Certification (CMMC) assessment. We discuss the asset categories—CUI Assets, Security Protection Assets, Specialized Assets, and Out-of-Scope Assets—and their specific requirements. Learn how to categorize and docu…
  continue reading
 
Send us a text Certainly! Here’s a polished description for your podcast episode: 🎙️ Episode Title: Demystifying the CMMC Final Rule: What It Means for Defense Contractors In this episode of CMMC News, we delve into the recently unveiled CMMC Final Rule by the Department of Defense. Join our AI hosts as they unpack the critical updates, explain wha…
  continue reading
 
Send us a text In this episode of CMMC News, we explore the proposed CMMC Tax Credit and its potential to provide financial relief for small defense contractors navigating the complexities of Cybersecurity Maturity Model Certification (CMMC) compliance. Discover how this tax credit could offset costs like technology upgrades, staff training, and th…
  continue reading
 
Send us a text In this episode of CMMC News, we break down the essential guidance on defining the scope of a Level 2 Cybersecurity Maturity Model Certification (CMMC) assessment. We explore the key asset categories—CUI Assets, Security Protection Assets, Contractor Risk Managed Assets, and Specialized Assets—and provide insights into categorizing a…
  continue reading
 
Send us a text In this episode of CMMC News, we explore the key guidance for conducting a Level 1 Cybersecurity Maturity Model Certification (CMMC) self-assessment. We discuss how to define the scope, including which assets—such as those processing, storing, or transmitting Federal Contract Information (FCI)—are included, and which, like IoT device…
  continue reading
 
Today's episode is a little different. We have the opportunity to speak to the host of ITPodcast.Club, available on major podcasting platforms and who is in their last year of university. This episode is a bit longer around 30 minutes, but Alwin and I talk about a few topics including, paid and free learning resources, how we learn, entry level wor…
  continue reading
 
Hello and welcome back to USB our Guest, Cyber Security tips. I’m Theo, here to help you break down cyber security news and hacks and how they affect you. However, today I am interviewing Anyaacii a Linux in HPC Administrator. We recorded the interview in an open discord voice channel with video while monitoring chat with Text-to-speech developed b…
  continue reading
 
Another interview! Yup! Today I am interviewing Tech Penguin who is a Senior Penetration Tester in the Netherlands. We recorded the interview in an open discord voice channel with video while monitoring chat with Text-to-speech developed by Security_Live. The Tech Penguin has 5 years experience as a penetration tester and a different entry to the C…
  continue reading
 
Today I am interviewing The MonoSpace Mentor, CEO and CTO of their own managed web hosting business. We recorded the interview in an open discord voice channel with video while monitoring chat with Text-to-speech developed by Security_Live. The MonoSpace mentor has a wealth of life experience that I will attempt to draw on. From early beginnings, g…
  continue reading
 
Today I am interviewing Tegora, an L3 System Administrator & Senior Technical Leader with technical responsibilities for Networking/Linux/HPC. We recorded the interview in an open discord voice channel with video while monitoring chat with Text-to-speech developed by Security_Live. While this time I had his volume level closer to mine, the music wa…
  continue reading
 
Hello and welcome back to USB our Guest, Cyber Security tips. I’m Theo, here to help you break down cyber security news and hacks and how they affect you. However, today I am interviewing Zoogs. He has been in the industry for a bit now and I wanted to pick his brain on a variety of topics. We decided to record this live on twitch with chat using t…
  continue reading
 
In this video Episode of USB our Guest, I Phish myself Repeatedly. Today I wanted to do something a little different and something I've wanted to do for a while. I'm getting phished, repeatedly. I'm going to show you multiple legitimate login screens next to spoofed login screens that actually steal credentials. We're gonna talk about when and wher…
  continue reading
 
This episode cover the LastPass breach that occurred in August. Links to the LastPass blog and articles referenced in the show are below. You can also find me on twitch at https://www.twitch.tv/b7h30. [LastPass - Notice of Recent Security Incident](https://blog.lastpass.com/2022/08/notice-of-recent-security-incident/) [Explore how LastPass keeps yo…
  continue reading
 
I sit down with Stefan from the Tech Hatters Discord for a discussion on the Russia / Ukraine Cyber War. Stefan is a University student working in the industry. Please see all the links for all the articles we discussed below. Feel free to run all the links provided below through VirusTotal to ensure safe to click. I do not suggest using the 1920.i…
  continue reading
 
Today’s episode covers the vulnerability affecting Java logging package, Log4j. This episode took a little longer to make than expected due to its complexity. Please see links below used to create the episode. TryHackMe’s Solar, exploiting log4j https://tryhackme.com/room/solar The Log4J Vulnerability Will Haunt the Internet for Years https://www.w…
  continue reading
 
Today's episode covers the recent Twitch hack. yikes. The entirety of Twitch has reportedly been leaked https://www.videogameschronicle.com/news/the-entirety-of-twitch-has-reportedly-been-leaked/ A Devastating Twitch Hack Sends Streamers Reeling - https://www.wired.com/story/devastating-twitch-hack-sends-streamers-reeling/ Twitch confirms it was ha…
  continue reading
 
This episode is about the recent EA/Electronic Arts hack that occurred on June 6th. TL:DR/L - only download from Legit game retailers. Hackers Steal Wealth of Data from Game Giant EA - https://www.vice.com/en/article/wx5xpx/hackers-steal-data-electronic-arts-ea-fifa-source-code Hackers leak full EA data after failed extortion attempt - https://ther…
  continue reading
 
Today’s episode is about the Ransomware attack that occurred on May 7th that forced Colonial Pipeline to shut down its operations. A Closer Look at the DarkSide Ransomware Gang - https://krebsonsecurity.com/2021/05/a-closer-look-at-the-darkside-ransomware-gang/#more-55529 Colonial Pipeline attack: Everything you need to know- https://www.zdnet.com/…
  continue reading
 
Today’s episode covers the FBI’s Unprecedented helpful remote hacking of Hafnium infected servers. The FBI is remotely hacking hundreds of computers to protect them from Hafnium- https://www.theverge.com/2021/4/13/22382821/fbi-doj-hafnium-remote-access-removal-hack The FBI got a court order to delete backdoors from hacked Exchange servers- https://…
  continue reading
 
Today's episode is about cheaters or modders getting infected with RAT’s or a Remote Access Trojans. Tech Republic - Malicious attack now targeting video gamers and modders https://www.techrepublic.com/article/malicious-attack-now-targeting-video-gamers-and-modders/ Cisco Talos - Cheating the cheater: How adversaries are using backdoored video game…
  continue reading
 
Today’s episode covers RATs or Remote Access Trojans. There is a great article on DarkReading that gives an overview of what RATs do and I’ll include it in the show notes. In This episode we will cover What are RATs, how do they find their way on your computer, what they do when they find themselves on there and what you can do to protect your devi…
  continue reading
 
Today’s episode covers the Microsoft Server Exchange Hack. So disclaimer here, this is a fairly technical hack. The purpose of this episode is to give you a high level overview of the hack, a timeline, who is responsible and what to do? Krebs on Security - At Least 30,000 U.S. Organizations Newly Hacked Via Holes in Microsoft’s Email Software - htt…
  continue reading
 
Silver Sparrow as discovered by Red Canary RedCanary's silver sparrow discovery - https://redcanary.com/blog/clipping-silver-sparrows-wings/ Computer world - https://www.computerworld.com/article/3609611/30k-macs-infected-with-silver-sparrow-virus-m1-mac-ssd-health.html MITRE|ATT&CK - LaunchAgents - https://attack.mitre.org/techniques/T1543/001/ Cy…
  continue reading
 
Hello and welcome back to USB our Guest Cyber Security tips. Today's episode is about CD Projekt Red's CyberPunk2077 Breach. Spoiler, they tell hackers 'no thank you' to ransom demands and restore from backup. Wired article https://www.wired.com/story/cd-projekt-red-ransomware-hack-cyberpunk-2077-source-code/ knowbe4 blog https://blog.knowbe4.com/c…
  continue reading
 
Today's episode covers Zero Days. What are they, why you should know about them and what you should do when you hear about them.Recent Windows Zero day - https://www.darkreading.com/vulnerabilities---threats/microsoft-fixes-windows-zero-day-in-patch-tuesday-rollout/d/d-id/1340114FireEye Zero-Day definition - https://www.fireeye.com/current-threats/…
  continue reading
 
Today's topic is Coronavirus Phishing Scams.https://www.consumer.ftc.gov/blog/2020/06/help-covid-19-contact-tracers-not-scammers https://www.irs.gov/coronavirus/economic-impact-payments https://www.consumer.ftc.gov/blog/2020/04/coronavirus-stimulus-payment-scams-what-you-need-know https://coronavirus.ohio.gov/wps/portal/gov/covid-19/covid-19-vaccin…
  continue reading
 
This episode is about Software Updates and why they are important to install asap. Norton anti-virus article mentioned in the episode. https://us.norton.com/internetsecurity-how-to-the-importance-of-general-software-updates-and-patches.html WannaCrypt/WannaCry wiki-pedia entry https://en.wikipedia.org/wiki/WannaCry_ransomware_attack…
  continue reading
 
Today's episode covers the website https://haveibeenpwned.com Troy hunt created haveibeenpwned.com with the simple idea that there should be place for you to find out if your credentials have been stolen. visit haveibeenpwned.com to easily search breaches with your email address or browse breaches
  continue reading
 
Today's episode is about whaling. What is it and what can you do to thwart an attack. There is a great article on Rapid7's Blog on whaling. Find it here. https://www.rapid7.com/fundamentals/whaling-phishing-attacks/ . As mentioned at the end of the podcast, I wanted to try something a little different. For a chance to win a $10 Amazon Gift card, se…
  continue reading
 
Today's Episode covers Backups. What are backups, why you should use them and how to do them. Find the PC mag article referenced in the podcast at https://www.pcmag.com/news/the-beginners-guide-to-pc-backup Find the Microsoft support article referenced in the podcast at https://support.microsoft.com/en-us/help/4027408/windows-10-backup-and-restore …
  continue reading
 
Today's Episode covers Ransomware. What is it and how can you protect yourself from it. Find the knowbe4 article we referenced in the show at https://www.knowbe4.com/ransomware . Find the Sophos article I referenced at the end of the episode at https://news.sophos.com/en-us/2020/09/17/maze-attackers-adopt-ragnar-locker-virtual-machine-technique/ Su…
  continue reading
 
This Flash Briefing is about Utility Company Scam Calls. Federal Trade Commission website - Empower yourself against utility scams - by Lisa Lake https://www.consumer.ftc.gov/blog/2018/09/empower-yourself-against-utility-scams Federal Trade Commission Complaint Assistant https://www.ftccomplaintassistant.gov/#crnt&panel1-1…
  continue reading
 
Today's tip is about the Hacking Humans podcast by Cyberwire with Dave Bitner and Joe Carrigan. Hacking Humans podcast by Cyberwire with Dave Bitner and Joe Carrigan https://thecyberwire.com/podcasts/hacking-humans.html CyberWire https://thecyberwire.com/podcasts/daily-podcast.html
  continue reading
 
Loading …

クイックリファレンスガイド

探検しながらこの番組を聞いてください
再生