<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[Cyberleaf]]></title><description><![CDATA[Enterprise-grade managed security without enterprise complexity. 24/7 threat detection, CMMC & SOC 2 compliance. Built for growth.]]></description><link>https://www.cyberleaf.io/blog</link><generator>RSS for Node</generator><lastBuildDate>Fri, 10 Apr 2026 21:25:14 GMT</lastBuildDate><atom:link href="https://www.cyberleaftest.com/blog-feed.xml" rel="self" type="application/rss+xml"/><item><title><![CDATA[CMMC Certification Explained: A Practical Guide for Defense Contractors ]]></title><description><![CDATA[Cybersecurity Maturity Model Certification (CMMC) is no longer a future consideration for defense contractors. It is a contract requirement that determines who can bid, win, and retain Department of Defense work. What makes CMMC different from prior cybersecurity mandates is enforcement. Organizations are no longer allowed to self-assert compliance and move on. They must prove, through assessment, that security controls are implemented, followed, and sustained. This page is designed for...]]></description><link>https://www.cyberleaf.io/post/cmmc-certification-explained-a-practical-guide-for-defense-contractors</link><guid isPermaLink="false">69b9603afb188211e4744b64</guid><pubDate>Tue, 17 Mar 2026 14:29:41 GMT</pubDate><enclosure url="https://static.wixstatic.com/media/40e0af_a004fa3b52e54a95858297f1b64c2d91~mv2.png/v1/fit/w_1000,h_1000,al_c,q_80/file.png" length="0" type="image/png"/><dc:creator>Max Heinemann</dc:creator></item><item><title><![CDATA[CMMC vs NIST SP 800-171: Key Differences for Defense Contractors ]]></title><description><![CDATA[Many defense contractors assume NIST SP 800-171 and Cybersecurity Maturity Model Certification (CMMC) are interchangeable.  They are not.  NIST SP 800-171 defines the cybersecurity controls organizations must implement to protect Controlled Unclassified Information (CUI). CMMC determines whether the Department of Defense verifies that those controls are actually in place.  Understanding the differences between CMMC and NIST SP 800-171 is the first step toward preparing for a CMMC readiness...]]></description><link>https://www.cyberleaf.io/post/cmmc-vs-nist-sp-800-171-key-differences-for-defense-contractors</link><guid isPermaLink="false">69b19ce0edb584b04e28260b</guid><pubDate>Wed, 11 Mar 2026 16:56:55 GMT</pubDate><enclosure url="https://static.wixstatic.com/media/40e0af_33cd29757ca040b588f2c927108629d7~mv2.jpg/v1/fit/w_1000,h_1000,al_c,q_80/file.png" length="0" type="image/png"/><dc:creator>Max Heinemann</dc:creator></item><item><title><![CDATA[Why Tool Sprawl Is One of the Biggest Barriers to CMMC Compliance]]></title><description><![CDATA[For many organizations pursuing CMMC compliance, the problem is not a lack of cybersecurity investment. In fact, it’s often the opposite. Years of reacting to new threats, insurance requirements, customer demands, and compliance frameworks have left many environments packed with security tools. Endpoint protection, email filtering, MFA, backups, logging platforms, vulnerability scanners, and more all exist side by side. Individually, each tool makes sense. Collectively, they create tool...]]></description><link>https://www.cyberleaf.io/post/why-tool-sprawl-is-one-of-the-biggest-barriers-to-cmmc-compliance</link><guid isPermaLink="false">699de2cd10b7eac1decdfe06</guid><pubDate>Tue, 24 Feb 2026 17:43:23 GMT</pubDate><enclosure url="https://static.wixstatic.com/media/nsplsh_e9230bc65efb4197a5794d32501b1708~mv2.jpg/v1/fit/w_1000,h_1000,al_c,q_80/file.png" length="0" type="image/png"/><dc:creator>Max Heinemann</dc:creator></item><item><title><![CDATA[Why Tool Stacks Fail Without Security Orchestration ]]></title><description><![CDATA[More Tools Does Not Equal More Security Over the past decade, many organizations have invested heavily in cybersecurity tools. Endpoint protection, email security, identity monitoring, cloud security, vulnerability management, and dozens of other technologies now exist in most environments. Despite this investment, breaches continue to increase. The reason is simple. Security tools are designed to solve individual problems. Attacks do not happen in individual tools. Modern Attacks Are Multi...]]></description><link>https://www.cyberleaf.io/post/why-tool-stacks-fail-without-security-orchestration</link><guid isPermaLink="false">6995c39d658df599f4fb24ef</guid><pubDate>Wed, 18 Feb 2026 13:51:33 GMT</pubDate><enclosure url="https://static.wixstatic.com/media/40e0af_cf423513466149b784924dfecbd56e19~mv2.png/v1/fit/w_300,h_300,al_c,q_80/file.png" length="0" type="image/png"/><dc:creator>Max Heinemann</dc:creator></item><item><title><![CDATA[What Managed Security Services Should Actually Include in 2026 ]]></title><description><![CDATA[Managed Security Has Changed. Many Providers Have Not. A lot of organizations believe they have managed security today. What they actually have is alert forwarding. In 2026, managed security is no longer about watching dashboards or forwarding tickets to internal IT teams. Threat actors move quickly across identity systems, cloud infrastructure, endpoints, and third-party integrations. Security providers that focus on one layer or one tool cannot keep up with how attacks actually unfold....]]></description><link>https://www.cyberleaf.io/post/what-managed-security-services-should-actually-include-in-2026</link><guid isPermaLink="false">698b9b52e2bc92e835de1b50</guid><pubDate>Tue, 10 Feb 2026 21:00:17 GMT</pubDate><enclosure url="https://static.wixstatic.com/media/nsplsh_2e21f05682a641859ae6cd04decbd4ae~mv2.jpg/v1/fit/w_1000,h_1000,al_c,q_80/file.png" length="0" type="image/png"/><dc:creator>Max Heinemann</dc:creator></item><item><title><![CDATA[Let’s Be Honest About CMMC Level 2: It Isn’t a Quick Process.]]></title><description><![CDATA[There’s a growing belief in some corners of industry that CMMC Level 2 can be achieved quickly by outsourcing all of the work. It’s an appealing idea, hand off the problem, get a clean bill of health, move on. But that’s not how CMMC Level 2 works. Even with strong partners, a skilled consultant, a reliable MSP, and a secure enclave, organizations still need to do the internal work. They must update processes, train staff, maintain documentation, and demonstrate that controls don’t just exist...]]></description><link>https://www.cyberleaf.io/post/let-s-be-honest-about-cmmc-level-2-it-isn-t-a-quick-process</link><guid isPermaLink="false">6925ec7c8fab50c3b6a12000</guid><pubDate>Tue, 25 Nov 2025 17:52:58 GMT</pubDate><enclosure url="https://static.wixstatic.com/media/40e0af_7c517c1983894a0d8d37533924a416d4~mv2.png/v1/fit/w_801,h_451,al_c,q_80/file.png" length="0" type="image/png"/><dc:creator>Will Ogle</dc:creator></item><item><title><![CDATA[What Is CMMC and Who Needs to Comply?]]></title><description><![CDATA[A 2025 Guide for Defense Contractors and Suppliers CMMC is now fully in effect. As of November 10, 2025, the Cybersecurity Maturity Model Certification is active within the Department of Defense contracting ecosystem, and organizations across the Defense Industrial Base are expected to meet the required level of compliance. For companies that handle Federal Contract Information or Controlled Unclassified Information, this shift marks the beginning of a new standard for cybersecurity...]]></description><link>https://www.cyberleaf.io/post/what-is-cmmc-and-who-needs-to-comply</link><guid isPermaLink="false">691de5c5a69a1ab4b19d5c63</guid><pubDate>Wed, 19 Nov 2025 15:48:10 GMT</pubDate><enclosure url="https://static.wixstatic.com/media/40e0af_9f60ced4fc3848a5b0f5ba729f468517~mv2.png/v1/fit/w_800,h_400,al_c,q_80/file.png" length="0" type="image/png"/><dc:creator>Max Heinemann</dc:creator></item><item><title><![CDATA[How to Become CMMC Compliant: What to Expect, What to Avoid, and How to Get It Done ]]></title><description><![CDATA[If you’ve already started the journey toward CMMC compliance, you know it’s not just a checkbox — it’s a commitment to securing your organization’s data, protecting your position in the defense supply chain, and future-proofing your ability to win DoD contracts. Whether you’re preparing for a formal audit or closing the final gaps in your CMMC readiness plan, this guide will walk you through what happens next, how to choose the right support, and what sets a successful submission apart. What...]]></description><link>https://www.cyberleaf.io/post/how-to-become-cmmc-compliant-what-to-expect-what-to-avoid-and-how-to-get-it-done</link><guid isPermaLink="false">691b7d6edd35cb65e8686ed1</guid><pubDate>Mon, 17 Nov 2025 20:00:44 GMT</pubDate><enclosure url="https://static.wixstatic.com/media/40e0af_be1d6e335f1348ee9664af95ec079822~mv2.png/v1/fit/w_1000,h_963,al_c,q_80/file.png" length="0" type="image/png"/><dc:creator>Max Heinemann</dc:creator></item><item><title><![CDATA[How MSPs Can Capitalize on CMMC: Packaging, Selling, and Delivering Compliance Readiness Services ]]></title><description><![CDATA[The Cybersecurity Maturity Model Certification (CMMC) is no longer just a government initiative — it’s a business opportunity. As the DoD begins enforcing CMMC 2.0 across contracts in 2025, thousands of small and mid-sized contractors will need help reaching and maintaining compliance. This creates a massive opportunity for Managed Service Providers (MSPs) to step in. MSPs already manage IT infrastructure, patching, access control, and endpoint protection. With the right partner and...]]></description><link>https://www.cyberleaf.io/post/how-msps-can-capitalize-on-cmmc-packaging-selling-and-delivering-compliance-readiness-services</link><guid isPermaLink="false">6914aacaa15a2f8917076ecc</guid><pubDate>Wed, 12 Nov 2025 15:52:18 GMT</pubDate><enclosure url="https://static.wixstatic.com/media/nsplsh_754f68427842323357616f~mv2.jpg/v1/fit/w_1000,h_1000,al_c,q_80/file.png" length="0" type="image/png"/><dc:creator>Max Heinemann</dc:creator></item><item><title><![CDATA[What the November 10 CMMC Deadline Means for Defense Contractors ]]></title><description><![CDATA[The Department of Defense’s CMMC enforcement begins November 10, 2025. Learn what this milestone means, how it affects contractors, and how Cyberleaf’s four-phase approach helps you achieve compliance efficiently and at scale. The CMMC Rule Becomes Real On November 10, 2025, the Department of Defense’s Cybersecurity Maturity Model Certification (CMMC) program moves from policy to practice. Beginning this date, contracting officers can start including CMMC requirements in new solicitations and...]]></description><link>https://www.cyberleaf.io/post/what-the-november-10-cmmc-deadline-means-for-defense-contractors</link><guid isPermaLink="false">6912470a819a5e59209a6d2b</guid><pubDate>Mon, 10 Nov 2025 20:16:43 GMT</pubDate><enclosure url="https://static.wixstatic.com/media/nsplsh_53394a3148716f4c396e73~mv2_d_4896_3264_s_4_2.jpg/v1/fit/w_1000,h_1000,al_c,q_80/file.png" length="0" type="image/png"/><dc:creator>Max Heinemann</dc:creator></item><item><title><![CDATA[Ransomware Has Evolved. AI is the New Weapon]]></title><description><![CDATA[A discovery by Anton Cherepanov, a researcher at ESET, has revealed what may be the first AI-powered ransomware variant, codenamed PromptLock . This aligns with predictions that generative AI would be used this year to facilitate malicious scripts and exploits. Written in Golang, the newly identified strain uses the gpt-oss:20b  model from OpenAI locally via the Ollama API to generate malicious Lua scripts in real time. The open-weight language model was released  by OpenAI earlier this...]]></description><link>https://www.cyberleaf.io/post/ransomware-has-evolved-ai-is-the-new-weapon</link><guid isPermaLink="false">68dbd2b971ab8141d24222ec</guid><pubDate>Tue, 02 Sep 2025 16:09:04 GMT</pubDate><enclosure url="https://static.wixstatic.com/media/nsplsh_e75c298a94764892bc13f014d6ff0676~mv2.jpg/v1/fit/w_1000,h_1000,al_c,q_80/file.png" length="0" type="image/png"/><dc:creator>Adam Sewall</dc:creator></item><item><title><![CDATA[HB 96 Ushers in a New Era of Cybersecurity for Ohio]]></title><description><![CDATA[When Governor Mike DeWine signed Ohio House Bill 96 into law on June 30, 2025, it set the stage for a major shift in how local...]]></description><link>https://www.cyberleaf.io/post/hb-96-ushers-in-a-new-era-of-cybersecurity-for-ohio</link><guid isPermaLink="false">68dbd2b871ab8141d24222db</guid><pubDate>Wed, 13 Aug 2025 16:12:04 GMT</pubDate><enclosure url="https://static.wixstatic.com/media/nsplsh_15b27f10291747c6ad6d574dfd422ed7~mv2.jpg/v1/fit/w_1000,h_1000,al_c,q_80/file.png" length="0" type="image/png"/><dc:creator>Max Heinemann</dc:creator></item><item><title><![CDATA[How One Missing Control Cost Hamilton $18.3 Million]]></title><description><![CDATA[On February 25, 2024, the City of Hamilton, Ontario experienced a cyberattack that disabled roughly 80 percent of its network and...]]></description><link>https://www.cyberleaf.io/post/how-one-missing-control-cost-hamilton-18-3-million</link><guid isPermaLink="false">68dbd2b971ab8141d24222eb</guid><pubDate>Tue, 05 Aug 2025 13:17:17 GMT</pubDate><enclosure url="https://static.wixstatic.com/media/nsplsh_33075d0b6a6446e3a9763a5b3c21eb70~mv2.jpg/v1/fit/w_1000,h_1000,al_c,q_80/file.png" length="0" type="image/png"/><dc:creator>Adam Sewall</dc:creator></item><item><title><![CDATA[What’s Changed in Scattered Spider’s Tactics, Techniques &#38; Procedures (TTPs)]]></title><description><![CDATA[Allianz, Aflac, Caesars, MGM Resorts, Twilio, Snowflake customers, M&#38;S, Co-Op, Harrods, Victoria's Secret, Philadelphia Insurance, Erie...]]></description><link>https://www.cyberleaf.io/post/what-s-changed-in-scattered-spider-s-tactics-techniques-procedures-ttps</link><guid isPermaLink="false">68dbd2b971ab8141d24222e9</guid><pubDate>Mon, 04 Aug 2025 17:27:19 GMT</pubDate><enclosure url="https://static.wixstatic.com/media/nsplsh_645945754642384b514a6b~mv2_d_6024_4024_s_4_2.jpg/v1/fit/w_1000,h_1000,al_c,q_80/file.png" length="0" type="image/png"/><dc:creator>Adam Sewall</dc:creator></item><item><title><![CDATA[Aeroflot Airlines’ IT Infrastructure Destroyed in Year-Long Attack]]></title><description><![CDATA[Russia’s Aeroflot, one of the world’s oldest airlines, has been left scrambling after pro-Ukraine hackers claimed to have “completely...]]></description><link>https://www.cyberleaf.io/post/aeroflot-airlines-it-infrastructure-destroyed-in-year-long-attack</link><guid isPermaLink="false">68dbd2b971ab8141d24222ea</guid><pubDate>Thu, 31 Jul 2025 17:27:57 GMT</pubDate><enclosure url="https://static.wixstatic.com/media/nsplsh_433964685556502d6f3677~mv2_d_4024_6024_s_4_2.jpg/v1/fit/w_1000,h_1000,al_c,q_80/file.png" length="0" type="image/png"/><dc:creator>Adam Sewall</dc:creator></item><item><title><![CDATA[Waterleaf International Announces Appointment of Dave Burg to Board of Directors]]></title><description><![CDATA[Waterleaf International, LLC (Waterleaf) is pleased to announce the recent appointment of Dave Burg as its newest board member....]]></description><link>https://www.cyberleaf.io/post/waterleaf-international-announces-appointment-of-dave-burg-to-board-of-directors</link><guid isPermaLink="false">68dbd2b871ab8141d24222e2</guid><pubDate>Thu, 17 Jul 2025 13:55:04 GMT</pubDate><enclosure url="https://static.wixstatic.com/media/40e0af_1534494bb28043dabf782a9a4f2d60ba~mv2.png/v1/fit/w_1000,h_1000,al_c,q_80/file.png" length="0" type="image/png"/><dc:creator>mheinemann1</dc:creator></item><item><title><![CDATA[Red Team Perspective: Turning AI Agents Into the Next Initial Access Vector ]]></title><description><![CDATA[AI agents are software systems that leverage artificial intelligence and natural language processing to perform complex tasks on behalf...]]></description><link>https://www.cyberleaf.io/post/red-team-perspective-turning-ai-agents-into-the-next-initial-access-vector</link><guid isPermaLink="false">68dbd2b871ab8141d24222ad</guid><pubDate>Tue, 08 Jul 2025 17:36:46 GMT</pubDate><enclosure url="https://static.wixstatic.com/media/nsplsh_d620340a792d4d758d22268e784003e8~mv2.jpg/v1/fit/w_1000,h_1000,al_c,q_80/file.png" length="0" type="image/png"/><dc:creator>Jason Moulder</dc:creator></item><item><title><![CDATA[Waterleaf International Names Cory Brasel as Chief Product Officer]]></title><description><![CDATA[FORT MYERS, FL, UNITED STATES, June 26, 2025 / EINPresswire.com /  -- Waterleaf International, LLC (Waterleaf) is pleased to announce the...]]></description><link>https://www.cyberleaf.io/post/waterleaf-international-names-cory-brasel-as-chief-product-officer</link><guid isPermaLink="false">68dbd2b871ab8141d24222de</guid><pubDate>Thu, 26 Jun 2025 12:18:36 GMT</pubDate><enclosure url="https://static.wixstatic.com/media/40e0af_a2db053f11e6489f9f5587977a0e06cf~mv2.jpg/v1/fit/w_1000,h_1000,al_c,q_80/file.png" length="0" type="image/png"/><dc:creator>mheinemann1</dc:creator></item><item><title><![CDATA[Cyber Repercussions from the Iran Conflict: What Businesses and MSPs Need to Know]]></title><description><![CDATA[As military tensions escalate between the U.S., Israel, and Iran, another battlefront is emerging — cyberspace. On June 21, coordinated...]]></description><link>https://www.cyberleaf.io/post/cyber-repercussions-from-the-iran-conflict-what-businesses-and-msps-need-to-know</link><guid isPermaLink="false">68dbd2b871ab8141d24222e1</guid><pubDate>Tue, 24 Jun 2025 13:13:42 GMT</pubDate><enclosure url="https://static.wixstatic.com/media/11062b_281465449aa141ad9fefdd3fb8b6e52e~mv2_d_2298_1529_s_2.jpg/v1/fit/w_1000,h_1000,al_c,q_80/file.png" length="0" type="image/png"/><dc:creator>mheinemann1</dc:creator></item><item><title><![CDATA[Waterleaf International Names Jeff Buss as President &#38; Chief Executive Officer]]></title><description><![CDATA[FORT MYERS, Fla., June 17, 2025 - Waterleaf International, LLC (Waterleaf) is pleased to announce the recent appointment of Jeff Buss as...]]></description><link>https://www.cyberleaf.io/post/waterleaf-international-names-jeff-buss-as-president-chief-executive-officer</link><guid isPermaLink="false">68dbd2b871ab8141d24222e0</guid><pubDate>Tue, 17 Jun 2025 13:13:26 GMT</pubDate><enclosure url="https://static.wixstatic.com/media/40e0af_4b9cbf85f8204c1e9f9533ff47453df4~mv2.png/v1/fit/w_1000,h_1000,al_c,q_80/file.png" length="0" type="image/png"/><dc:creator>mheinemann1</dc:creator></item></channel></rss>