• Blog
en English
ar Arabiczh-CN Chinese (Simplified)nl Dutchen Englishfr Frenchde Germanit Italianpt Portugueseru Russianes Spanish
  • About
    • Overview
    • Capability Statement
    • White Papers
    • Contract Vehicles
    • Corporate Citizenship
    • Certifications
    • Partnerships
    • Meet Our Team
    • News
    • Employee Portal
  • Services
    • Cybersecurity
    • IT Modernization
    • Strategy & Governance
    • Data & Analytics
    • Professional Services
    • Application & Platform Development
  • Project Showcase
  • Careers
    • Current Opportunities
    • Candidate Referral Program
    • Employee Benefits
    • Apply for Employment
  • Contact Us
SD Solutions, LLC
SD Solutions, LLC
  • About
    • Overview
    • Capability Statement
    • White Papers
    • Contract Vehicles
    • Corporate Citizenship
    • Certifications
    • Partnerships
    • Meet Our Team
    • News
    • Employee Portal
  • Services
    • Cybersecurity
    • IT Modernization
    • Strategy & Governance
    • Data & Analytics
    • Professional Services
    • Application & Platform Development
  • Project Showcase
  • Careers
    • Current Opportunities
    • Candidate Referral Program
    • Employee Benefits
    • Apply for Employment
  • Contact Us
Call us
Call us 540-860-0920
  1. Home /
  2. Posts tagged "CISA"
HAFNIUM, ProxyLogon, and DearCry
Collaboration, Cybersecurity  |   March 18, 2021

HAFNIUM, ProxyLogon, and DearCry

We explained what zero-day vulnerabilities and zero-day attacks are in a previous article. New examples were provided early this month. On March 2, Tom Burt, Corporate Vice President of Customer
Read more
C&CC2CISAcommand-and-controlDearCryHAFNIUMmicrosoftMITREProxyLogonransomwareservervulnerabilitiesvulnerabilityWannaCryweb shellzero-day
Zero-Day Vulnerabilities and Zero-Day Attacks
Cybersecurity  |   March 3, 2021

Zero-Day Vulnerabilities and Zero-Day Attacks

Every now and then, a zero-day attack will make headlines in the world of cybersecurity. Zero-day attacks exploit zero-day vulnerabilities. According to Ryan Naraine of ZDNet, the Stuxnet worm—discovered in
Read more
CISAcyber extortioncybersecurityexploitationhackNISTStuxnetvulnerabilitiesvulnerabilitywormzero-day
SUNBURST and Supply Chain Attacks
Collaboration, Cybersecurity  |   December 23, 2020

SUNBURST and Supply Chain Attacks

Recently, a global intrusion campaign has been making headlines. The campaign exploits SolarWinds Orion software, and roughly 18,000 of SolarWinds’ customers have been compromised. This article provides an overview of
Read more
backdoorCISAcybersecurityFireEyemalwareNISTSolarWindsSUNBURSTsupply chain attacktrojan
Insider Threats and the Principle of Least Privilege
Collaboration, Cybersecurity  |   December 16, 2020

Insider Threats and the Principle of Least Privilege

The majority of cybercriminals operate outside of the organizations they target, but some threats come from within the organizations themselves. The Department of Homeland Security defines an insider threat as
Read more
CISAcybersecurityinsider threatoperating systemprinciple of least privilegeSIEMsocial engineering
National Cybersecurity Awareness Month and the Internet of Things
Collaboration, Cybersecurity  |   October 16, 2020

National Cybersecurity Awareness Month and the Internet of Things

This month, National Cyber Security Awareness Month (NCSAM) is observed for its 17th year in a row. To celebrate NCSAM, the Cybersecurity & Infrastructure Security Agency (CISA), the National Institute
Read more
CISAFBIIoTNCSAMnetwork segmentationNISTShadow IoTVLAN

  • Phone Number: 540-860-0920
  • Email: bizdev@sdsolutionsllc.com
  • Address:
    • Corporate Office:
      8000 Towers Crescent Dr., Suite 1700, Vienna, VA 22182
    • Principal Office: 58 W. Main St., Ste B, Luray, VA 22835

Copyright © 2020 - SD Solutions, LLC.