Our news

  • ICS/SCADA Security Technologies

    Introduction Industrial computer systems (ICSs) are a type of Supervisory Control and Data Acquisition (SCADA) systems. ICS’s embedded architectures differ from standard enterprise systems. They do consist of interconnected systems, but the heart of their system is the Programmable Logic Controller (PLC) instead of a CPU. The PLC is responsible for providing system reliability by…

    READ MORE

  • Security controls for ICS/SCADA environments

    Introduction The Center for Internet Security (CIS) has written controls and benchmarks that are used to help protect various environments from potential threats. The CIS Controls version 7 is the latest release. They used 7 key principles for writing the controls: The controls are broken up into 3 main areas, with 20 sub sections: CIS…

    READ MORE

  • Supply Chain based Threats 2019 and Beyond

    Introduction Businesses do not act alone when providing services or products to their customers. They often have manufactures, suppliers and distributors included in their network. The steps used from origin to delivery of the product or service, and the activities, entities and resources included in the process are all a part of the supply chain.…

    READ MORE

  • What does CMMC mean for DoD Contractors?

    What is CMMC? The Cybersecurity Maturity Model Certification (CMMC) is a new framework and certification process instituted by the government to document and verify federal contracting companies’ security posture. Much like the Risk Management Framework (RMF), it is a way to unify the cybersecurity standards across these companies. Why CMMC? The RMF is based on…

    READ MORE

  • Don’t Take the Bait

    As technology continues to advance, so do the methods that scammers use to steal our personal information. One of the most common forms of scamming is through phone calls and text messages. In this blog post, we will discuss some of the most prevalent types of call and texting scams, and what you can do…

    READ MORE

  • The Role of vCISO: Navigating Cybersecurity Leadership Virtually

    Introduction In cybersecurity, having a guardian who understands the intricacies of the digital landscape is not a luxury; it’s a necessity. Enter the vCISO (Virtual Chief Information Security Officer), a virtual sentinel of your organization’s digital fortress. This article elucidates the vCISO’s role, its contributions to cybersecurity leadership, and how Dark Apple can enhance your…

    READ MORE

  • Incident Response 101: Navigating Cybersecurity Breaches with Finesse

    Introduction In today’s interconnected world, the digital realm is both a realm of opportunity and a battlefield of threats. In this context, incident response emerges as a beacon of defense. This article serves as your guide to understanding incident response, its paramount importance in cybersecurity, and how Dark Apple can steer you through this critical…

    READ MORE

  •  Understanding NOC vs. SOC: Deciphering the Right Security Operations Center for You

    Introduction In the digital age, cyber threats are ever-present; a robust security framework is imperative. Two vital components of this framework are Network Operations Centers (NOCs) and Security Operations Centers (SOCs). In this article, we unravel the distinctions between these two critical centers, assisting you in making an informed choice for your organization’s security needs.…

    READ MORE

  • Building a Resilient Cybersecurity Strategy: Elevating Protection through Managed Services

    Introduction In today’s rapidly evolving digital landscape, a robust cybersecurity strategy isn’t just a necessity; it’s a cornerstone of success. As businesses of all sizes face increasingly sophisticated cyber threats, one solution stands out: managed cybersecurity services. In this article, we delve into the world of managed services, uncovering their benefits, how they fortify your…

    READ MORE

  • The Ultimate Guide to Government Contracting: Tapping into Public Sector Opportunities

    Introduction In the intricate landscape of business expansion, few arenas offer as promising and sustainable growth as government contracting. As business owners, envisioning your enterprise flourishing in the public sector is not just a dream – it’s an achievable reality. In this comprehensive guide, we’ll delve into the world of government contracting, unveiling opportunities, strategies,…

    READ MORE