Threat & Research Team Blog

Can ITAR Be CUI? Why ITAR Could Be in Scope for your CMMC Assessment
Ross Seay Ross Seay

Can ITAR Be CUI? Why ITAR Could Be in Scope for your CMMC Assessment

Any defense contractors mistakenly believe ITAR-controlled data sits outside the boundaries of CMMC Level 2 — but that assumption could cost you your certification.

In reality, the National Archives and Records Administration (NARA) confirms that certain ITAR-regulated information qualifies as Controlled Unclassified Information (CUI Specified). That means if your organization handles ITAR data, it’s likely in scope for your CMMC assessment — and must meet strict safeguarding and dissemination requirements.

In this article, we explain how ITAR and CUI overlap, what the CUI Registry actually says, and why treating ITAR as CUI is both the safest and most compliant path forward for defense contractors.

Read More
What Does Effective Red Teaming Look Like?
Ross Seay Ross Seay

What Does Effective Red Teaming Look Like?

Many organizations invest in penetration tests or red team exercises—yet walk away wondering why their security posture hasn’t improved. The truth is, not all offensive security programs deliver equal value. The difference comes down to execution. Effective programs align testing with real business risks, uncover meaningful attack paths, and produce insights leaders can act on—not just another compliance report In this blog Penetration testing experts at Maverc Technologies, breaks down what separates average testing from truly impactful offensive security. You’ll learn the building blocks of effective coverage, how to assess your organization’s maturity level, and why red teaming is the capstone of a resilient security strategy. We’ll also introduce the 5-5-20x framework—a practical method for aligning red team scenarios to your most pressing threats, adversaries, and critical assets.

Read More
Scoping CUI for CMMC Level 2 Certification
Ross Seay Ross Seay

Scoping CUI for CMMC Level 2 Certification

Defining the scope of your Controlled Unclassified Information (CUI) environment is the first and most critical step in preparing for a CMMC Level 2 assessment. Proper scoping ensures you know exactly which assets, people, and systems fall within your compliance boundary—and it can make the difference between a smooth certification process and costly setbacks. In this blog, we break down the scoping requirements, explain how to categorize assets, and share a practical checklist to help your organization build a clear, audit-ready System Security Plan (SSP).

Read More
CMMC Compliance Series: The CMMC Shared Responsibility Matrix
CMMC, Cyber Security Compliance Ross Seay CMMC, Cyber Security Compliance Ross Seay

CMMC Compliance Series: The CMMC Shared Responsibility Matrix

The CMMC Shared Responsibility Matrix helps businesses define which cybersecurity tasks they own and which are handled by service providers like AWS or Microsoft Azure. By clarifying roles in encryption, access control, and incident response, organizations can simplify compliance, strengthen security, and prepare for upcoming CMMC requirements

Read More
Maverc Technologies Secures Statewide Cyber Security Solutions Contract with the Florida Department of Management Services
Wendy-Paige Hyde Wendy-Paige Hyde

Maverc Technologies Secures Statewide Cyber Security Solutions Contract with the Florida Department of Management Services

Maverc Technologies secures State Term Contract No. 43230000-24-STC with the Florida Department of Management Services (DMS) to provide cybersecurity solutions for government agencies. Under this statewide contract, Maverc will deliver Endpoint Detection and Response (EDR), Identity and Access Management (IAM), Threat Intelligence, Penetration Testing, and more, helping Florida strengthen its digital security and compliance with NIST, HIPAA, and CJIS. Learn more about this strategic cybersecurity initiative.

Read More
CVE-2024-24919 - Zero-Day Vulnerability Exploiting Check Point Security Gateways
Fady Abdeltawab Fady Abdeltawab

CVE-2024-24919 - Zero-Day Vulnerability Exploiting Check Point Security Gateways

CVE-2024-24919, has recently been identified in Check Point Security Gateways. This high-severity information disclosure vulnerability is actively being exploited in the wild, posing significant risks to organizations using Check Point products. This blog provides a comprehensive overview of CVE-2024-24919, steps to mitigate its impact, and indicators of compromise (IOCs) to help detect potential exploitation.

Read More
Juniper Networks Addresses Critical Vulnerabilities in SRX Firewalls and EX Switches (CVE-2024-21591)
Fady Abdeltawab Fady Abdeltawab

Juniper Networks Addresses Critical Vulnerabilities in SRX Firewalls and EX Switches (CVE-2024-21591)

Juniper Networks has taken significant steps to address critical vulnerabilities in its SRX Series firewalls and EX Series switches. The most noteworthy of these is the remote code execution (RCE) flaw, CVE-2024-21591, with a CVSS score of 9.8. This vulnerability poses a serious threat, allowing unauthenticated attackers to exploit the J-Web configuration interfaces and potentially execute remote code or initiate a Denial-of-Service (DoS) attack.

Read More
Ransomware Exploits VMware ESXi Vulnerabilities
Fady Abdeltawab Fady Abdeltawab

Ransomware Exploits VMware ESXi Vulnerabilities

Ransomware attacks targeting VMware ESXi infrastructure have exhibited a predictable yet alarming pattern, highlighting the vulnerabilities and misconfigurations inherent in virtualization platforms. Despite the varied nature of the ransomware deployed, the sequence of attacks remains consistent, making ESXi a lucrative target for cybercriminals.

Read More
Precision Threat Intelligence is Vital to Securing Industrial Control Systems and Operational Technology Environments
Ross Seay Ross Seay

Precision Threat Intelligence is Vital to Securing Industrial Control Systems and Operational Technology Environments

More than half a million new malware variants are discovered every single day. Once discovered, cybersecurity practitioners add them to industry-wide data feeds that fuel a wide variety of security technologies. But there’s a problem.

The volume of incoming threats is so high that most analysts can’t use this data in a timely manner. Manually querying the threat intelligence database and looking for the one threat that matches your particular operating environment can take hours – precious time that analysts don’t have.

Read More
JOIN US AT ICS MIAMI NOVEMBER 2nd- 3rd
Guest User Guest User

JOIN US AT ICS MIAMI NOVEMBER 2nd- 3rd

ICSMiami
A Critical Infrastructure Cybersecurity Conference— Join Cybersecurity Executives and Subject Matter Experts in Aventura, Florida to discuss the threats, use cases, and solutions needed to meet critical infrastructure cybersecurity needs.

Read More

Explore our Cybersecurity offerings today.