{"version":"https://jsonfeed.org/version/1","title":"Micro.blog - J. Gregory McVerry","home_page_url":"https://micro.blog","feed_url":"https://micro.blog/posts/DoctorMac","_microblog":{"about":"https://micro.blog/about/api","id":"60684","username":"DoctorMac","bio":"","pronouns":"","is_following":false,"is_you":false,"following_count":16,"discover_count":0},"author":{"name":"J. Gregory McVerry","url":"http://drmacscybersecuritybrief.com","avatar":"https://micro.blog/DoctorMac/avatar.jpg"},"items":[{"id":"86391650","content_html":"<p><img src=\"https://cdn.uploads.micro.blog/29546/2026/your-paragraph-text2.png\" width=\"463\" height=\"600\" alt=\"\" loading=\"lazy\"></p>\n","summary":"","url":"https://www.drmacscybersecuritybrief.com/2026/03/17/114711.html","date_published":"2026-03-17T15:47:11+00:00","author":{"name":"J. Gregory McVerry","url":"http://drmacscybersecuritybrief.com","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Fmicro.blog%2FDoctorMac%2Favatar.jpg","_microblog":{"username":"DoctorMac"}},"_microblog":{"date_relative":"2026-03-17 15:47","date_timestamp":1773762431,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":false,"is_linkpost":false,"is_mention":false,"note":"","syndication":[]}},{"id":"86251800","content_html":"<p>MAM versus MDM: Data and Device Protections <img src=\"https://micro.blog/photos/50/https://cdn.uploads.micro.blog/29546/2026/mdmvsmam.jpg\" width=\"20\" height=\"20\" class=\"mini_thumbnail\" alt=\"\"> : <a href=\"https://www.drmacscybersecuritybrief.com/2026/03/15/mam-versus-mdm-data-and.html\">drmacscybersecuritybrief.com</a></p>","summary":"","url":"https://www.drmacscybersecuritybrief.com/2026/03/15/mam-versus-mdm-data-and.html","date_published":"2026-03-15T14:55:48+00:00","author":{"name":"J. Gregory McVerry","url":"http://drmacscybersecuritybrief.com","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Fmicro.blog%2FDoctorMac%2Favatar.jpg","_microblog":{"username":"DoctorMac"}},"_microblog":{"date_relative":"2026-03-15 14:55","date_timestamp":1773586548,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":false,"is_linkpost":true,"is_mention":false,"note":"","syndication":[]}},{"id":"85076564","content_html":"<p>Big Announcement</p>\n\n<p>The DIB CS Program is OPEN for new companies. The outreach and onboarding functions have transitioned to DC3.</p>\n\n<p>DIB Companies, with or without an FCL, working with CUI, can apply at DC3.DIB.CSRegistration@us.af.mil</p>\n","summary":"","url":"https://www.drmacscybersecuritybrief.com/2026/02/26/big-announcement-the-dib-cs.html","date_published":"2026-02-26T15:34:43+00:00","author":{"name":"J. Gregory McVerry","url":"http://drmacscybersecuritybrief.com","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Fmicro.blog%2FDoctorMac%2Favatar.jpg","_microblog":{"username":"DoctorMac"}},"_microblog":{"date_relative":"2026-02-26 15:34","date_timestamp":1772120083,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":false,"is_linkpost":false,"is_mention":false,"note":"","syndication":[]}},{"id":"85071349","content_html":"<p>CyberDI's Customizable CMMC and Export Control Curriculum: <a href=\"https://www.drmacscybersecuritybrief.com/2026/02/26/cyberdis-customizable-cmmc-and-export.html\">drmacscybersecuritybrief.com</a></p>","summary":"","url":"https://www.drmacscybersecuritybrief.com/2026/02/26/cyberdis-customizable-cmmc-and-export.html","date_published":"2026-02-26T14:10:56+00:00","author":{"name":"J. Gregory McVerry","url":"http://drmacscybersecuritybrief.com","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Fmicro.blog%2FDoctorMac%2Favatar.jpg","_microblog":{"username":"DoctorMac"}},"_microblog":{"date_relative":"2026-02-26 14:10","date_timestamp":1772115056,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":false,"is_linkpost":true,"is_mention":false,"note":"","syndication":[]}},{"id":"85069476","content_html":"<p>CMMC Tool Sets: <a href=\"https://www.drmacscybersecuritybrief.com/2026/02/26/083004.html\">drmacscybersecuritybrief.com</a></p>","summary":"","url":"https://www.drmacscybersecuritybrief.com/2026/02/26/083004.html","date_published":"2026-02-26T13:30:04+00:00","author":{"name":"J. Gregory McVerry","url":"http://drmacscybersecuritybrief.com","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Fmicro.blog%2FDoctorMac%2Favatar.jpg","_microblog":{"username":"DoctorMac"}},"_microblog":{"date_relative":"2026-02-26 13:30","date_timestamp":1772112604,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":false,"is_linkpost":true,"is_mention":false,"note":"","syndication":[]}},{"id":"82763457","content_html":"<p><a href=\"https://micro.blog/manton\">@manton</a> I am very excited about this. I like blogging on micro.blog.</p>\n","url":"https://micro.blog/DoctorMac/82763457","date_published":"2026-01-24T14:02:27+00:00","author":{"name":"J. Gregory McVerry","url":"http://drmacscybersecuritybrief.com","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Fmicro.blog%2FDoctorMac%2Favatar.jpg","_microblog":{"username":"DoctorMac"}},"_microblog":{"date_relative":"2026-01-24 14:02","date_timestamp":1769263347,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":true,"is_linkpost":false,"is_mention":true}},{"id":"82693408","content_html":"<p>CMMC, Backups, and FedRAMP: <a href=\"https://www.drmacscybersecuritybrief.com/2026/01/23/cmmc-backups-and-fedramp.html\">drmacscybersecuritybrief.com</a></p>","summary":"","url":"https://www.drmacscybersecuritybrief.com/2026/01/23/cmmc-backups-and-fedramp.html","date_published":"2026-01-23T14:30:39+00:00","author":{"name":"J. Gregory McVerry","url":"http://drmacscybersecuritybrief.com","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Fmicro.blog%2FDoctorMac%2Favatar.jpg","_microblog":{"username":"DoctorMac"}},"_microblog":{"date_relative":"2026-01-23 14:30","date_timestamp":1769178639,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":false,"is_linkpost":true,"is_mention":false,"note":"","syndication":[]}},{"id":"78110297","content_html":"<p><a href=\"https://www.drmacscybersecuritybrief.com/uploads/2025/aiforsecuritysecurityforai.pdf\">AI For Security S ecurity For AI</a></p>\n\n<p>A good intro to the risks, challenges, and opportunities</p>\n","summary":"","url":"https://www.drmacscybersecuritybrief.com/2025/11/16/ai-for-security-s-ecurity.html","date_published":"2025-11-16T18:07:22+00:00","author":{"name":"J. Gregory McVerry","url":"http://drmacscybersecuritybrief.com","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Fmicro.blog%2FDoctorMac%2Favatar.jpg","_microblog":{"username":"DoctorMac"}},"_microblog":{"date_relative":"2025-11-16 18:07","date_timestamp":1763316442,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":false,"is_linkpost":false,"is_mention":false,"note":"","syndication":[]}},{"id":"77824149","content_html":"<p>Many people are confused by the Cross tenant collaboration and the new Microsoft UX:</p>\n\n<p><a href=\"https://www.drmacscybersecuritybrief.com/uploads/2025/gcch-m365-webinar-connect-collaborate-create-june-2025-complete.pdf\">gcch-m365-webinar-connect-collaborate-create-june-2025-complete.pdf</a></p>\n\n<p><img src=\"https://cdn.uploads.micro.blog/29546/2025/screenshot-2025-11-12-at-10.50.24am.png\" width=\"600\" height=\"370\" alt=\"\" loading=\"lazy\"></p>\n","summary":"","url":"https://www.drmacscybersecuritybrief.com/2025/11/12/many-people-are-confused-by.html","date_published":"2025-11-12T15:58:26+00:00","author":{"name":"J. Gregory McVerry","url":"http://drmacscybersecuritybrief.com","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Fmicro.blog%2FDoctorMac%2Favatar.jpg","_microblog":{"username":"DoctorMac"}},"_microblog":{"date_relative":"2025-11-12 15:58","date_timestamp":1762963106,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":false,"is_linkpost":false,"is_mention":false,"note":"","syndication":[]}},{"id":"51526951","content_html":"<blockquote>\n<p>You know what’s “worse” and more corrupt than pardoning your family members? Pardoning your criminal coconspirators. That’s what Trump did.</p>\n</blockquote>\n\n<p>– Elie Mystal in The Nation making the <a href=\"https://www.thenation.com/article/politics/joe-biden-hunter-pardon-was-right-mystal/\">obvious and strong defense of Biden’s pardon</a>.</p>\n","summary":"","url":"https://www.drmacscybersecuritybrief.com/2024/12/07/you-know-whats.html","date_published":"2024-12-07T22:16:06+00:00","author":{"name":"J. Gregory McVerry","url":"http://drmacscybersecuritybrief.com","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Fmicro.blog%2FDoctorMac%2Favatar.jpg","_microblog":{"username":"DoctorMac"}},"_microblog":{"date_relative":"2024-12-07 22:16","date_timestamp":1733609766,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":false,"is_linkpost":false,"is_mention":false,"note":"","syndication":[]}},{"id":"49997445","content_html":"<p>Adding sensitivity labels to SharePoint: <a href=\"https://learn.microsoft.com/en-us/purview/sensitivity-labels-sharepoint-extend-permissions\">learn.microsoft.com/en-us/pur…</a></p>\n\n<p>unlabeled filed continue to be protected with current SharePoint permissions for the user, even though the files have left original SharePoint boundary</p>\n\n<p>COOL!</p>\n","summary":"","url":"https://www.drmacscybersecuritybrief.com/2024/11/19/adding-sensitivity-labels.html","date_published":"2024-11-19T20:04:28+00:00","author":{"name":"J. Gregory McVerry","url":"http://drmacscybersecuritybrief.com","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Fmicro.blog%2FDoctorMac%2Favatar.jpg","_microblog":{"username":"DoctorMac"}},"_microblog":{"date_relative":"2024-11-19 20:04","date_timestamp":1732046668,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":false,"is_linkpost":false,"is_mention":false,"note":"","syndication":[]}},{"id":"49914431","content_html":"<p>Adding cross posting to Blue Sky</p>\n\n<p><img src=\"https://cdn.uploads.micro.blog/29546/2024/b91f7feed1.png\" width=\"600\" height=\"569\" alt=\"\" loading=\"lazy\"></p>\n","summary":"","url":"https://www.drmacscybersecuritybrief.com/2024/11/18/adding-cross-posting.html","date_published":"2024-11-18T17:09:09+00:00","author":{"name":"J. Gregory McVerry","url":"http://drmacscybersecuritybrief.com","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Fmicro.blog%2FDoctorMac%2Favatar.jpg","_microblog":{"username":"DoctorMac"}},"_microblog":{"date_relative":"2024-11-18 17:09","date_timestamp":1731949749,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":false,"is_linkpost":false,"is_mention":false,"note":"","syndication":[]}},{"id":"49781664","content_html":"<p>As always, better cybersecurity is better business</p>\n<p>You need to be be aware</p>\n<p>Good backups save all the bucks</p>\n<img src=\"https://cdn.micro.blog/photos/1000x/https%3A%2F%2Fwww.drmacscybersecuritybrief.com%2Fuploads%2F2024%2Funtitled-design.png\" width=\"600\" height=\"436\" alt=\" A stylized depiction of an eye with the words Be Aware in bold, surrounded by red digital patterns.\" loading=\"lazy\">\n","url":"https://micro.blog/DoctorMac/49781664","date_published":"2024-11-16T13:26:46+00:00","author":{"name":"J. Gregory McVerry","url":"http://drmacscybersecuritybrief.com","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Fmicro.blog%2FDoctorMac%2Favatar.jpg","_microblog":{"username":"DoctorMac"}},"_microblog":{"date_relative":"2024-11-16 13:26","date_timestamp":1731763606,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":true,"is_linkpost":false,"is_mention":true}},{"id":"49781626","content_html":"<p>Almost all cybersecurity frameworks and government regulations require  small businesses to periodically test your backup recovery systems.</p>\n<p>You need to make sure you can test processes and cloud solutions while training employees</p>\n<p>You need to run practice exercises</p>\n<img src=\"https://cdn.micro.blog/photos/1000x/https%3A%2F%2Fwww.drmacscybersecuritybrief.com%2Fuploads%2F2024%2F2.png\" width=\"600\" height=\"600\" alt=\"\" loading=\"lazy\">\n<p>Improve</p>\n","url":"https://micro.blog/DoctorMac/49781626","date_published":"2024-11-16T13:25:36+00:00","author":{"name":"J. Gregory McVerry","url":"http://drmacscybersecuritybrief.com","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Fmicro.blog%2FDoctorMac%2Favatar.jpg","_microblog":{"username":"DoctorMac"}},"_microblog":{"date_relative":"2024-11-16 13:25","date_timestamp":1731763536,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":true,"is_linkpost":false,"is_mention":true}},{"id":"49781540","content_html":"<p>Small business owners often overlook on  area of risk that allows attackers a chance to get your data.</p>\n<p>Your backup policy needs to spell out how long copies get kept and the proper way to destroy sensitive data</p>\n<img src=\"https://cdn.micro.blog/photos/1000x/https%3A%2F%2Fwww.drmacscybersecuritybrief.com%2Fuploads%2F2024%2Fdestroycui-1.png\" width=\"600\" height=\"776\" alt=\"\" loading=\"lazy\">\n","url":"https://micro.blog/DoctorMac/49781540","date_published":"2024-11-16T13:23:54+00:00","author":{"name":"J. Gregory McVerry","url":"http://drmacscybersecuritybrief.com","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Fmicro.blog%2FDoctorMac%2Favatar.jpg","_microblog":{"username":"DoctorMac"}},"_microblog":{"date_relative":"2024-11-16 13:23","date_timestamp":1731763434,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":true,"is_linkpost":false,"is_mention":true}},{"id":"49781359","content_html":"<p>Once you have policy and procedures in place you should deploy the backup system</p>\n<p>Means protecting backups</p>\n<p>It is at this stage where most bad guys break into your stuff and screw it all up.</p>\n<p>You need protect the backup system at all times and most involve shared responsibility</p>\n<img src=\"https://cdn.micro.blog/photos/1000x/https%3A%2F%2Fwww.drmacscybersecuritybrief.com%2Fuploads%2F2024%2F1.png\" width=\"600\" height=\"600\" alt=\"\" loading=\"lazy\">\n","url":"https://micro.blog/DoctorMac/49781359","date_published":"2024-11-16T13:19:27+00:00","author":{"name":"J. Gregory McVerry","url":"http://drmacscybersecuritybrief.com","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Fmicro.blog%2FDoctorMac%2Favatar.jpg","_microblog":{"username":"DoctorMac"}},"_microblog":{"date_relative":"2024-11-16 13:19","date_timestamp":1731763167,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":true,"is_linkpost":false,"is_mention":true}},{"id":"49781274","content_html":"<p>For almost every small business you will land on a cloud backup solution.</p>\n<p>These do not come without risk. You need to document in your system security plan how you mitigate these risks</p>\n<p>Encryption, MFA, and Least Privileged</p>\n<img src=\"https://cdn.micro.blog/photos/1000x/https%3A%2F%2Fwww.drmacscybersecuritybrief.com%2Fuploads%2F2024%2Fcloud-back-up-vendors-1.png\" width=\"600\" height=\"1500\" alt=\"\" loading=\"lazy\">\n","url":"https://micro.blog/DoctorMac/49781274","date_published":"2024-11-16T13:17:43+00:00","author":{"name":"J. Gregory McVerry","url":"http://drmacscybersecuritybrief.com","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Fmicro.blog%2FDoctorMac%2Favatar.jpg","_microblog":{"username":"DoctorMac"}},"_microblog":{"date_relative":"2024-11-16 13:17","date_timestamp":1731763063,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":true,"is_linkpost":false,"is_mention":true}},{"id":"49781184","content_html":"<p>Chances are your Managed Service Provide or IT shop handles much of your backup, but you are responsible for the risk</p>\n<p>Decisions belong to you. As you decide on the media types you need to  understand the risk associated with the storage solution and shared  responsibilities.</p>\n<img src=\"https://cdn.micro.blog/photos/1000x/https%3A%2F%2Fwww.drmacscybersecuritybrief.com%2Fuploads%2F2024%2Fbackupmediatypes-2.png\" width=\"600\" height=\"600\" alt=\"\" loading=\"lazy\">\n","url":"https://micro.blog/DoctorMac/49781184","date_published":"2024-11-16T13:15:36+00:00","author":{"name":"J. Gregory McVerry","url":"http://drmacscybersecuritybrief.com","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Fmicro.blog%2FDoctorMac%2Favatar.jpg","_microblog":{"username":"DoctorMac"}},"_microblog":{"date_relative":"2024-11-16 13:15","date_timestamp":1731762936,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":true,"is_linkpost":false,"is_mention":true}},{"id":"49780967","content_html":"<p>As you craft policies and procedures think about a 3-2-1 Backup strategy for your sensitive files</p>\n<p>You want three copies</p>\n<p>You want two different media types</p>\n<p>You want one off-site copy of anything needed for emergency restoration</p>\n<img src=\"https://cdn.micro.blog/photos/1000x/https%3A%2F%2Fwww.drmacscybersecuritybrief.com%2Fuploads%2F2024%2F3-2-1-note-taking-english-worksheet-blue-scaffold-table-2.png\" width=\"600\" height=\"776\" alt=\"\" loading=\"lazy\">\n","url":"https://micro.blog/DoctorMac/49780967","date_published":"2024-11-16T13:10:47+00:00","author":{"name":"J. Gregory McVerry","url":"http://drmacscybersecuritybrief.com","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Fmicro.blog%2FDoctorMac%2Favatar.jpg","_microblog":{"username":"DoctorMac"}},"_microblog":{"date_relative":"2024-11-16 13:10","date_timestamp":1731762647,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":true,"is_linkpost":false,"is_mention":true}},{"id":"49780905","content_html":"<p>Start now</p>\n<p>You need to identify the important files you handle and evaluate the common risks to those assets</p>\n<p>Know how the data moves, and decide how long you can be down, and how far backups need to go.</p>\n<p>Then develop procedures to make sure the plan is done and tested</p>\n<img src=\"https://cdn.micro.blog/photos/1000x/https%3A%2F%2Fwww.drmacscybersecuritybrief.com%2Fuploads%2F2024%2Fminimal-and-elegant-goals-action-plan-template-1.png\" width=\"600\" height=\"776\" alt=\"\" loading=\"lazy\">\n","url":"https://micro.blog/DoctorMac/49780905","date_published":"2024-11-16T13:09:14+00:00","author":{"name":"J. Gregory McVerry","url":"http://drmacscybersecuritybrief.com","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Fmicro.blog%2FDoctorMac%2Favatar.jpg","_microblog":{"username":"DoctorMac"}},"_microblog":{"date_relative":"2024-11-16 13:09","date_timestamp":1731762554,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":true,"is_linkpost":false,"is_mention":true}},{"id":"49780840","content_html":"<p>All of this should be documented in your backup recovery plan.</p>\n<p>Just choosing a vendor is not enough. Your back up and recovery plan should cover these eight elements</p>\n<img src=\"https://cdn.micro.blog/photos/1000x/https%3A%2F%2Fwww.drmacscybersecuritybrief.com%2Fuploads%2F2024%2Fpastel-action-plan-pinterest-pin-3.png\" width=\"600\" height=\"900\" alt=\"\" loading=\"lazy\">\n","url":"https://micro.blog/DoctorMac/49780840","date_published":"2024-11-16T13:07:40+00:00","author":{"name":"J. Gregory McVerry","url":"http://drmacscybersecuritybrief.com","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Fmicro.blog%2FDoctorMac%2Favatar.jpg","_microblog":{"username":"DoctorMac"}},"_microblog":{"date_relative":"2024-11-16 13:07","date_timestamp":1731762460,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":true,"is_linkpost":false,"is_mention":true}},{"id":"49780746","content_html":"<p>And if your business is considered critical infrastructure</p>\n<p>or if you want your insurance to be worth the money you pay.</p>\n<p>You need good backups, by demand of law and lawyers</p>\n<p>And it means more than just hiring a Cloud Company.</p>\n<p>You need to plan</p>\n<p><img src=\"https://cdn.micro.blog/photos/1000x/https%3A%2F%2Fwww.drmacscybersecuritybrief.com%2Fuploads%2F2024%2Fscreenshot-2024-11-15-at-10.39.30-am.png\" width=\"600\" height=\"645\" alt=\"\" loading=\"lazy\">​</p>\n","url":"https://micro.blog/DoctorMac/49780746","date_published":"2024-11-16T13:05:46+00:00","author":{"name":"J. Gregory McVerry","url":"http://drmacscybersecuritybrief.com","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Fmicro.blog%2FDoctorMac%2Favatar.jpg","_microblog":{"username":"DoctorMac"}},"_microblog":{"date_relative":"2024-11-16 13:05","date_timestamp":1731762346,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":true,"is_linkpost":false,"is_mention":true}},{"id":"49780650","content_html":"<p>People keep asking, “What they can do?”</p>\n\n<p>How can they help</p>\n\n<p>If you are a small business owner one of the best things you can do is make sure you have a good backup and recovery plan</p>\n\n<p>Good back ups are the Victory Gardens of the 21st Century</p>\n\n<p><img src=\"https://cdn.uploads.micro.blog/29546/2024/vintage-beer-factory-label-circle-sticker-1.png\" width=\"600\" height=\"600\" alt=\"\" loading=\"lazy\"></p>\n","summary":"","url":"https://www.drmacscybersecuritybrief.com/2024/11/16/people-keep-asking.html","date_published":"2024-11-16T13:03:33+00:00","author":{"name":"J. Gregory McVerry","url":"http://drmacscybersecuritybrief.com","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Fmicro.blog%2FDoctorMac%2Favatar.jpg","_microblog":{"username":"DoctorMac"}},"_microblog":{"date_relative":"2024-11-16 13:03","date_timestamp":1731762213,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":true,"is_linkpost":false,"is_mention":false,"note":"","syndication":[]}},{"id":"44244205","content_html":"<p>This is like some weird SEO album name thing… and it totally works.</p>\n\n<p><img src=\"https://cdn.micro.blog/photos/1000x/https%3A%2F%2Fjson.blog%2Fuploads%2F2024%2F763970d6-9117-4e1e-af72-395b4027fb1c.jpg\" alt='An Apple Music screenshot for a new music release titled \"Sleeping Ghibli Autumn Music Box Premium BEST.\" The background features a forest scene with autumn foliage and sunlight streaming through the trees.' loading=\"lazy\"></p>\n","summary":"","url":"https://www.drmacscybersecuritybrief.com/2024/08/26/this-is-like.html","date_published":"2024-08-26T19:28:44+00:00","author":{"name":"J. Gregory McVerry","url":"http://drmacscybersecuritybrief.com","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Fmicro.blog%2FDoctorMac%2Favatar.jpg","_microblog":{"username":"DoctorMac"}},"_microblog":{"date_relative":"2024-08-26 19:28","date_timestamp":1724700524,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":false,"is_linkpost":false,"is_mention":false,"note":"","syndication":[]}},{"id":"43134090","content_html":"<p>Under the new ZTA guidelines established by OMB M-22-09: Agencies must use strong MFA throughout their enterprise.<br>\nThis means all agency staff, contractors, and partners use  phishing-resistant MFA for privileged access and soon, all access.</p>\n<p>For public users, phishing-resistant MFA must be an option. Meaning signing into a government website to do your taxes</p>\n<p>For most of your basic insurance needs, not including your sensitive data, any MFA will probably suffice</p>\n<img src=\"https://cdn.micro.blog/photos/1000x/https%3A%2F%2Fwww.drmacscybersecuritybrief.com%2Fuploads%2F2024%2Funtitled-design.png\" width=\"600\" height=\"436\" alt=\"\" loading=\"lazy\">\n","url":"https://micro.blog/DoctorMac/43134090","date_published":"2024-08-08T14:18:53+00:00","author":{"name":"J. Gregory McVerry","url":"http://drmacscybersecuritybrief.com","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Fmicro.blog%2FDoctorMac%2Favatar.jpg","_microblog":{"username":"DoctorMac"}},"_microblog":{"date_relative":"2024-08-08 14:18","date_timestamp":1723126733,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":true,"is_linkpost":false,"is_mention":true}},{"id":"43133778","content_html":"<p>The US Government has required MFA for decades</p>\n<p>Executive Order 13681 back in 2014 “Improving the Security of Consumer Financial Transactions” made MFA<br>\nrequired for access to digital applications containing personal information.</p>\n<p>NIST  published SP 800-63-3 in 2017 and MFA was required to access to any personal information. They recommend phishing resistant MFA and require it for the most sensitive data.</p>\n<p>In 2021  EO 14028 “Improving the Nation’s Cybersecurity” required All US government agencies<br>\nrequired to implement MFA.</p>\n<p>Then in 2022 we moved to a ZTA philosophy OMB M-22-09 and MFA now  required throughout the federal enterprise.</p>\n<p>But now insurance demands it, so you need it too.</p>\n","url":"https://micro.blog/DoctorMac/43133778","date_published":"2024-08-08T14:14:26+00:00","author":{"name":"J. Gregory McVerry","url":"http://drmacscybersecuritybrief.com","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Fmicro.blog%2FDoctorMac%2Favatar.jpg","_microblog":{"username":"DoctorMac"}},"_microblog":{"date_relative":"2024-08-08 14:14","date_timestamp":1723126466,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":true,"is_linkpost":false,"is_mention":true}},{"id":"43133518","content_html":"<p>Stronger MFA relies on asymmetric key cryptography. This  protects from phishing attacks.</p>\n<p>In fact in NIST- SP-800-63-3 NIST sets requirements to cryptographic authenticators such as  PIV/CAC, FIDO U2F authenticators,  or FIDO2/WebAuthN.</p>\n<p>Those are fancy two dollar words to mean a different channel for your authentication mechanism that is always encrypted.</p>\n<p>People can’t social engineer the encrypted token because the user don’t know it</p>\n<img src=\"https://cdn.micro.blog/photos/1000x/https%3A%2F%2Fwww.drmacscybersecuritybrief.com%2Fuploads%2F2021%2F376e26bca4.png\" width=\"600\" height=\"387\" alt=\"\" loading=\"lazy\">\n","url":"https://micro.blog/DoctorMac/43133518","date_published":"2024-08-08T14:09:11+00:00","author":{"name":"J. Gregory McVerry","url":"http://drmacscybersecuritybrief.com","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Fmicro.blog%2FDoctorMac%2Favatar.jpg","_microblog":{"username":"DoctorMac"}},"_microblog":{"date_relative":"2024-08-08 14:09","date_timestamp":1723126151,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":true,"is_linkpost":false,"is_mention":true}},{"id":"43133234","content_html":"<p>Not all MFA is Equal</p>\n<p>Yes Multifactor Authentication always provides greater protection than simple a username and a password but the mechanisms exist on a scale.</p>\n<p>For most small businesses enabling MFA will be enough. Others who handle sensitive data maybe required to use more stringent MFA that is resistant to Phishing attacks</p>\n<p>Take phone calls are SMS messages. These are vulnerable to hacking and aren’t allowed on Federal systems. My university, on less secure data, allows SMS authentication</p>\n<p>These are called shared secrets, like one time passwords, and they are vulnerable to phishing</p>\n","url":"https://micro.blog/DoctorMac/43133234","date_published":"2024-08-08T14:04:09+00:00","author":{"name":"J. Gregory McVerry","url":"http://drmacscybersecuritybrief.com","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Fmicro.blog%2FDoctorMac%2Favatar.jpg","_microblog":{"username":"DoctorMac"}},"_microblog":{"date_relative":"2024-08-08 14:04","date_timestamp":1723125849,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":true,"is_linkpost":false,"is_mention":true}},{"id":"43132104","content_html":"<p>In order for you to meet the MFA requirements of your Insurance Company you can’t just enable MFA in Microsoft or Google.</p>\n<p>You need to identify system users, you need to what processes access your system, and what devices connect to your system.</p>\n<p>Like all things cyber this begins with Good Governance.</p>\n<p>You should have an identification and authentication policy. You should have an HR guide that lists the procedures used to add or remove users from your company. Your employee handbook should cover the password policy, and your training needs to cover MFA.</p>\n<img src=\"https://cdn.micro.blog/photos/1000x/https%3A%2F%2Fwww.drmacscybersecuritybrief.com%2Fuploads%2F2023%2Ff5f4c46bbc.png\" width=\"600\" height=\"1500\" alt=\"\" loading=\"lazy\">\n","url":"https://micro.blog/DoctorMac/43132104","date_published":"2024-08-08T13:47:29+00:00","author":{"name":"J. Gregory McVerry","url":"http://drmacscybersecuritybrief.com","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Fmicro.blog%2FDoctorMac%2Favatar.jpg","_microblog":{"username":"DoctorMac"}},"_microblog":{"date_relative":"2024-08-08 13:47","date_timestamp":1723124849,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":true,"is_linkpost":false,"is_mention":true}},{"id":"43131723","content_html":"<p>No single factor is ideal for authentication. Multifactor authentication to a system uses two or more of the mechanisms.</p>\n<p>Ideally you want them in different channels. For example you enter a username and password in one channel, but then a token is created in your authentication app on your phone.</p>\n<img src=\"https://cdn.micro.blog/photos/1000x/https%3A%2F%2Fwww.drmacscybersecuritybrief.com%2Fuploads%2F2024%2Fpurple-prepositions-circle-sticker.png\" width=\"600\" height=\"600\" alt=\"\" loading=\"lazy\">\n","url":"https://micro.blog/DoctorMac/43131723","date_published":"2024-08-08T13:40:52+00:00","author":{"name":"J. Gregory McVerry","url":"http://drmacscybersecuritybrief.com","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Fmicro.blog%2FDoctorMac%2Favatar.jpg","_microblog":{"username":"DoctorMac"}},"_microblog":{"date_relative":"2024-08-08 13:40","date_timestamp":1723124452,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":true,"is_linkpost":false,"is_mention":true}},{"id":"43131479","content_html":"<p>Most of us have gone our whole lives using passwords as authentication. but we have four mechanisms commonly used to prove a user’s identity.</p>\n<p>-Something you know like a password<br>\n-Something you possess. Like your ATM or MAC (for my Philly friends)<br>\n-Something you are. Like a finger print<br>\nSomething you do. Like a voice print when you say, “ My Voice Is My Passport Verify Me”</p>\n<p>Multi-factor just means more than one</p>\n<img src=\"https://cdn.micro.blog/photos/1000x/https%3A%2F%2Fwww.drmacscybersecuritybrief.com%2Fuploads%2F2024%2Fgreen-watercolor-leaf-on-light-yellow-background-square-pillow.png\" width=\"600\" height=\"600\" alt=\"\" loading=\"lazy\">\n","url":"https://micro.blog/DoctorMac/43131479","date_published":"2024-08-08T13:36:21+00:00","author":{"name":"J. Gregory McVerry","url":"http://drmacscybersecuritybrief.com","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Fmicro.blog%2FDoctorMac%2Favatar.jpg","_microblog":{"username":"DoctorMac"}},"_microblog":{"date_relative":"2024-08-08 13:36","date_timestamp":1723124181,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":true,"is_linkpost":false,"is_mention":true}},{"id":"43131150","content_html":"<p>MFA, or multi-factor authentication, gets used in the process of how you  identify users, their authorization levels, and then authenticate the users identity.</p>\n<p>Authentication means proving a user’s identity.</p>\n<img src=\"https://cdn.micro.blog/photos/1000x/https%3A%2F%2Fwww.drmacscybersecuritybrief.com%2Fuploads%2F2024%2Fcopy-of-green-simple-healthy-meals-thank-you-circle-sticker1.png\" width=\"600\" height=\"600\" alt=\"\" loading=\"lazy\">\n","url":"https://micro.blog/DoctorMac/43131150","date_published":"2024-08-08T13:30:35+00:00","author":{"name":"J. Gregory McVerry","url":"http://drmacscybersecuritybrief.com","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Fmicro.blog%2FDoctorMac%2Favatar.jpg","_microblog":{"username":"DoctorMac"}},"_microblog":{"date_relative":"2024-08-08 13:30","date_timestamp":1723123835,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":true,"is_linkpost":false,"is_mention":true}},{"id":"43130792","content_html":"<p>Many companies are now hearing more and more about Multi-Factor Authentication. In fact for most small businesses you can no longer get insurance, let alone cyber coverage, without ensuring MFA gets used for all sensitive data.</p>\n\n<p>Really if you can turn on Multi-Factor Authentication. You should</p>\n\n<p><img src=\"https://cdn.uploads.micro.blog/29546/2022/18635e877f.png\" width=\"600\" height=\"720\" alt=\"MFA\" loading=\"lazy\"></p>\n","summary":"","url":"https://www.drmacscybersecuritybrief.com/2024/08/08/many-companies-are.html","date_published":"2024-08-08T13:23:54+00:00","author":{"name":"J. Gregory McVerry","url":"http://drmacscybersecuritybrief.com","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Fmicro.blog%2FDoctorMac%2Favatar.jpg","_microblog":{"username":"DoctorMac"}},"_microblog":{"date_relative":"2024-08-08 13:23","date_timestamp":1723123434,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":true,"is_linkpost":false,"is_mention":false,"note":"","syndication":[]}},{"id":"15879946","content_html":"<p><img src=\"https://cdn.micro.blog/photos/1000x/https%3A%2F%2Fwww.drmacscybersecuritybrief.com%2Fuploads%2F2023%2Ff5f4c46bbc.png\" width=\"240\" height=\"600\" alt=\"\" loading=\"lazy\"></p>\n","summary":"","url":"https://www.drmacscybersecuritybrief.com/2023/01/11/082114.html","date_published":"2023-01-11T13:21:14+00:00","author":{"name":"J. Gregory McVerry","url":"http://drmacscybersecuritybrief.com","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Fmicro.blog%2FDoctorMac%2Favatar.jpg","_microblog":{"username":"DoctorMac"}},"_microblog":{"date_relative":"2023-01-11 13:21","date_timestamp":1673443274,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":false,"is_linkpost":false,"is_mention":false,"note":"","syndication":[]}},{"id":"14449300","content_html":"<p><a href=\"https://micro.blog/jean\">@jean</a> This!!</p>\n","url":"https://micro.blog/DoctorMac/14449300","date_published":"2022-11-28T18:41:00+00:00","author":{"name":"J. Gregory McVerry","url":"http://drmacscybersecuritybrief.com","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Fmicro.blog%2FDoctorMac%2Favatar.jpg","_microblog":{"username":"DoctorMac"}},"_microblog":{"date_relative":"2022-11-28 18:41","date_timestamp":1669660860,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":true,"is_linkpost":false,"is_mention":true}},{"id":"14446160","content_html":"<p>Certified CMMC Assessor: Spinning the Wheels of Trust in Much Bigger Systems <img src=\"https://micro.blog/photos/50/https://www.drmacscybersecuritybrief.com/uploads/2022/4cf58d7db4.jpg\" width=\"20\" height=\"20\" class=\"mini_thumbnail\"> : <a href=\"https://www.drmacscybersecuritybrief.com/2022/11/28/certified-cmmc-assessor.html\">drmacscybersecuritybrief.com</a></p>","summary":"","url":"https://www.drmacscybersecuritybrief.com/2022/11/28/certified-cmmc-assessor.html","date_published":"2022-11-28T17:14:28+00:00","author":{"name":"J. Gregory McVerry","url":"http://drmacscybersecuritybrief.com","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Fmicro.blog%2FDoctorMac%2Favatar.jpg","_microblog":{"username":"DoctorMac"}},"_microblog":{"date_relative":"2022-11-28 17:14","date_timestamp":1669655668,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":false,"is_linkpost":true,"is_mention":false,"note":"","syndication":[]}},{"id":"13443660","content_html":"<p>Hanging at Converge Security and learning about Conway’s Law at the Keynote addresds</p>\n","summary":"","url":"https://www.drmacscybersecuritybrief.com/2022/09/29/hanging-at-converge.html","date_published":"2022-09-29T16:47:21+00:00","author":{"name":"J. Gregory McVerry","url":"http://drmacscybersecuritybrief.com","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Fmicro.blog%2FDoctorMac%2Favatar.jpg","_microblog":{"username":"DoctorMac"}},"_microblog":{"date_relative":"2022-09-29 16:47","date_timestamp":1664470041,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":false,"is_linkpost":false,"is_mention":false,"note":"","syndication":[]}},{"id":"13165991","content_html":"<p><a href=\"https://micro.blog/aaronpk\">@aaronpk</a> this was my version: <a href=\"https://www.drmacscybersecuritybrief.com/uploads/2022/ff73583364.png\">www.drmacscybersecuritybrief.com/uploads/2…</a></p>\n","url":"https://micro.blog/DoctorMac/13165991","date_published":"2022-07-20T01:18:15+00:00","author":{"name":"J. Gregory McVerry","url":"http://drmacscybersecuritybrief.com","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Fmicro.blog%2FDoctorMac%2Favatar.jpg","_microblog":{"username":"DoctorMac"}},"_microblog":{"date_relative":"2022-07-20 01:18","date_timestamp":1658279895,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":true,"is_linkpost":false,"is_mention":true}},{"id":"13165986","content_html":"<p><a href=\"https://micro.blog/manton\">@manton</a> micropub for migration….been a dream</p>\n","url":"https://micro.blog/DoctorMac/13165986","date_published":"2022-07-20T01:15:18+00:00","author":{"name":"J. Gregory McVerry","url":"http://drmacscybersecuritybrief.com","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Fmicro.blog%2FDoctorMac%2Favatar.jpg","_microblog":{"username":"DoctorMac"}},"_microblog":{"date_relative":"2022-07-20 01:15","date_timestamp":1658279718,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":true,"is_linkpost":false,"is_mention":true}},{"id":"13165514","content_html":"<p>Developing a Rubric to Assess Policies and Procedures for CMMC Compliance: <a href=\"https://www.drmacscybersecuritybrief.com/2022/07/19/developing-a-rubric.html\">drmacscybersecuritybrief.com</a></p>","summary":"","url":"https://www.drmacscybersecuritybrief.com/2022/07/19/developing-a-rubric.html","date_published":"2022-07-19T22:24:11+00:00","author":{"name":"J. Gregory McVerry","url":"http://drmacscybersecuritybrief.com","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Fmicro.blog%2FDoctorMac%2Favatar.jpg","_microblog":{"username":"DoctorMac"}},"_microblog":{"date_relative":"2022-07-19 22:24","date_timestamp":1658269451,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":false,"is_linkpost":true,"is_mention":false,"note":"","syndication":[]}},{"id":"13131418","content_html":"<p>Can you Engineer Culture in your Systems? <a href=\"https://www.drmacscybersecuritybrief.com/2022/07/11/can-you-engineer.html\">drmacscybersecuritybrief.com</a></p>","summary":"","url":"https://www.drmacscybersecuritybrief.com/2022/07/11/can-you-engineer.html","date_published":"2022-07-11T13:43:33+00:00","author":{"name":"J. Gregory McVerry","url":"http://drmacscybersecuritybrief.com","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Fmicro.blog%2FDoctorMac%2Favatar.jpg","_microblog":{"username":"DoctorMac"}},"_microblog":{"date_relative":"2022-07-11 13:43","date_timestamp":1657547013,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":false,"is_linkpost":true,"is_mention":false,"note":"","syndication":[]}},{"id":"12859278","content_html":"<p>Guide to Microsoft's Security and Compliance Rebranding <img src=\"https://micro.blog/photos/50/https://www.drmacscybersecuritybrief.com/uploads/2022/8f5ae1f72d.jpg\" width=\"20\" height=\"20\" class=\"mini_thumbnail\"> : <a href=\"https://www.drmacscybersecuritybrief.com/2022/05/11/guide-to-microsoft.html\">drmacscybersecuritybrief.com</a></p>","summary":"","url":"https://www.drmacscybersecuritybrief.com/2022/05/11/guide-to-microsoft.html","date_published":"2022-05-11T13:24:00+00:00","author":{"name":"J. Gregory McVerry","url":"http://drmacscybersecuritybrief.com","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Fmicro.blog%2FDoctorMac%2Favatar.jpg","_microblog":{"username":"DoctorMac"}},"_microblog":{"date_relative":"2022-05-11 13:24","date_timestamp":1652275440,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":false,"is_linkpost":true,"is_mention":false,"note":"","syndication":[]}},{"id":"12849545","content_html":"<p>Matt Titcombe on the Compliance Trap from the Department of Defense.</p>\n","summary":"","url":"https://www.drmacscybersecuritybrief.com/2022/05/09/matt-titcombe-on.html","date_published":"2022-05-09T20:20:00+00:00","author":{"name":"J. Gregory McVerry","url":"http://drmacscybersecuritybrief.com","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Fmicro.blog%2FDoctorMac%2Favatar.jpg","_microblog":{"username":"DoctorMac"}},"_microblog":{"date_relative":"2022-05-09 20:20","date_timestamp":1652127600,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":false,"is_linkpost":false,"is_mention":false,"note":"","syndication":[]}},{"id":"12849499","content_html":"<p>Amira Armond on how inheritance and CMMC works.</p>\n","summary":"","url":"https://www.drmacscybersecuritybrief.com/2022/05/09/amira-armond-on.html","date_published":"2022-05-09T19:59:00+00:00","author":{"name":"J. Gregory McVerry","url":"http://drmacscybersecuritybrief.com","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Fmicro.blog%2FDoctorMac%2Favatar.jpg","_microblog":{"username":"DoctorMac"}},"_microblog":{"date_relative":"2022-05-09 19:59","date_timestamp":1652126340,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":false,"is_linkpost":false,"is_mention":false,"note":"","syndication":[]}},{"id":"12848597","content_html":"<p>Excited for Kyle Lai’s talk on ISO 2700. This is why I came.</p>\n","summary":"","url":"https://www.drmacscybersecuritybrief.com/2022/05/09/excited-for-kyle.html","date_published":"2022-05-09T16:17:00+00:00","author":{"name":"J. Gregory McVerry","url":"http://drmacscybersecuritybrief.com","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Fmicro.blog%2FDoctorMac%2Favatar.jpg","_microblog":{"username":"DoctorMac"}},"_microblog":{"date_relative":"2022-05-09 16:17","date_timestamp":1652113020,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":false,"is_linkpost":false,"is_mention":false,"note":"","syndication":[]}},{"id":"12848540","content_html":"<p>Good discussion on the difference between the word specified, identified, and defined.</p>\n","url":"https://micro.blog/DoctorMac/12848540","date_published":"2022-05-09T16:00:40+00:00","author":{"name":"J. Gregory McVerry","url":"http://drmacscybersecuritybrief.com","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Fmicro.blog%2FDoctorMac%2Favatar.jpg","_microblog":{"username":"DoctorMac"}},"_microblog":{"date_relative":"2022-05-09 16:00","date_timestamp":1652112040,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":true,"is_linkpost":false,"is_mention":true}},{"id":"12848511","content_html":"<p>Then goes into software permission using a deny list and an allow list. They use the brdige approach with a permit by exception.</p>\n","url":"https://micro.blog/DoctorMac/12848511","date_published":"2022-05-09T15:52:54+00:00","author":{"name":"J. Gregory McVerry","url":"http://drmacscybersecuritybrief.com","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Fmicro.blog%2FDoctorMac%2Favatar.jpg","_microblog":{"username":"DoctorMac"}},"_microblog":{"date_relative":"2022-05-09 15:52","date_timestamp":1652111574,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":true,"is_linkpost":false,"is_mention":true}},{"id":"12848508","content_html":"<p>Auditing and MFA were the hardest part for Kratos to implement</p>\n","url":"https://micro.blog/DoctorMac/12848508","date_published":"2022-05-09T15:52:02+00:00","author":{"name":"J. Gregory McVerry","url":"http://drmacscybersecuritybrief.com","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Fmicro.blog%2FDoctorMac%2Favatar.jpg","_microblog":{"username":"DoctorMac"}},"_microblog":{"date_relative":"2022-05-09 15:52","date_timestamp":1652111522,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":true,"is_linkpost":false,"is_mention":true}},{"id":"12848502","content_html":"<p>Cole French a C3PAO on preparing for CMMC.</p>\n","summary":"","url":"https://www.drmacscybersecuritybrief.com/2022/05/09/cole-french-a.html","date_published":"2022-05-09T15:50:00+00:00","author":{"name":"J. Gregory McVerry","url":"http://drmacscybersecuritybrief.com","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Fmicro.blog%2FDoctorMac%2Favatar.jpg","_microblog":{"username":"DoctorMac"}},"_microblog":{"date_relative":"2022-05-09 15:50","date_timestamp":1652111400,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":true,"is_linkpost":false,"is_mention":false,"note":"","syndication":[]}},{"id":"12848451","content_html":"<p>Victoria Pillitteri of NIST on future of 171</p>\n","summary":"","url":"https://www.drmacscybersecuritybrief.com/2022/05/09/victoria-pillitteri-of.html","date_published":"2022-05-09T15:35:00+00:00","author":{"name":"J. Gregory McVerry","url":"http://drmacscybersecuritybrief.com","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Fmicro.blog%2FDoctorMac%2Favatar.jpg","_microblog":{"username":"DoctorMac"}},"_microblog":{"date_relative":"2022-05-09 15:35","date_timestamp":1652110500,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":true,"is_linkpost":false,"is_mention":false,"note":"","syndication":[]}}]}