Facebook  Linkedin  X

March 2026

NEWS & UPDATES

Welcome to the WPI Cyber Newsletter, a monthly publication from the Wisconsin Procurement Institute (WPI), Wisconsin's Apex Accelerator


If your organization needs assistance meeting Federal or Department of Defense cyber security requirements, contact Marc Violante, Director of Federal Market Strategies at marcv@wispro.org, or Matt Frost, Government Contract Specialist at mattf@wispro.org

NEWS & UPDATES

Cyber Strategy for America – 7 pages

Pillars of Action


Six Policy Pillars underpin this strategy and will guide implementation and measures for success.


They are:

  1. Shape Adversay Behavior
  2. Promote Common Sense Regulation
  3. Modernize and Secure Federal Government Networks
  4. Secure Critical Infrastructure
  5. Sustain Superiority in Critical and Emerging Technologies
  6. Build Talent and Capacity


https://www.whitehouse.gov/wp-content/uploads/2026/03/president-trumps-cyber-strategy-for-america.pdf

GAO: DOD Needs to Improve Implementation of CMMC


The Department of Defense (DOD) needs to address external factors that could impede implementation of a major new cybersecurity program that has faced pushback from industry, the Government Accountability Office (GAO) said.


In a report issued March 12, GAO said DOD – which the Trump administration has rebranded as the Department of War – has not systematically identified the key factors outside of its control that could affect the success of the Cybersecurity Maturity Model Certification (CMMC) program.


https://www.meritalk.com/articles/gao-dod-needs-to-improve-implementation-of-cmmc/


Read GAO’s Report:


Defense Contractor Cybersecurity: DOD Should Address External Factors That Could Impede Program Implementation

https://www.gao.gov/products/gao-26-107955

Reducing the Attack Surface for End-of-Support Edge Devices


What Are EOS Edge Devices?


Edge devices are technologies that reside on the boundary of a network and are accessible from the public internet and other external environments. An edge device becomes an “end‑of‑support” (EOS) device when its manufacturer no longer:


  • Monitors it for defects in its software and/or firmware; and
  • Updates it with patches for common vulnerabilities and exposures (CVEs), security updates, and software fixes (hotfixes).


EOS edge devices pose significant risks for organizations because threat actors can exploit unresolved security gaps. Nation‑state threat actors can exploit these devices as entry points to access modern, supported environments, placing organizations’ data, services, and overall security at serious risk.


https://www.fbi.gov/investigate/cyber/alerts/2026/reducing-the-attack-surface-for-end-of-support-edge-devices


This Fact Sheet addresses two issues that all businesses should monitor. More importantly, all DoD contractors should also be keenly aware of these issues. All external facing devices pose a threat. Devices that are no longer being supported also provide a threat since the manufacturer is no longer actively involved with conducting security reviews or issuing updates. Both are included as NIST 800-171 r2 security measures. The System Security Plan (SSP) should have an appendix or supplement that lists all devices and associated information. This listing may also be of use for budget purposes and to develop network management and upgrade plans.

NIST has developed a chip that reliably emits a single photon on demand. This ability will improve the efficiency of QKD (quantum key distribution) as we prepare for the arrival of quantum computers.



Quantum computers will upend current cryptology by using Shor’s algorithm to rapidly negate the current public/private key secure encryption methods. This has largely been solved by NIST’s post quantum cryptology (PQC) algorithms.

 

Knowledge of this future is driving the ‘harvest now, decrypt later’ spate of data exfiltration – companies may not even know their encrypted data has been stolen. But adversaries, including, if not primarily, nation state adversaries, are storing that data knowing they will be able to decrypt it in the future; and who knows how many vital secrets may be within it? 

 

The arrival of quantum computing is future, but the threat is current. Commercial and federal organizations need to protect against quantum computing decryption now.

 

NIST’s Quantum Breakthrough: Single Photons Produced on a Chip - SecurityWeek

Half of all cyberattacks start in your browser: 10 essential tips for staying safe


New research finds that 48% of cyberattacks involve your web browser - and AI is only making matters worse. Follow these best practices to protect yourself.


https://www.zdnet.com/article/browser-security-tips-stay-safe/

CISA Warns of Attacks Exploiting Recent SharePoint Vulnerability


The SharePoint remote code execution vulnerability CVE-2026-20963, which Microsoft patched in January, has been exploited in the wild.


CISA added CVE-2026-20963 to its Known Exploited Vulnerabilities (KEV) catalog on March 18, instructing federal agencies to address it by March 21.


Microsoft has described the vulnerability as a critical remote code execution flaw (CVSS 9.8) enabled by deserialization of untrusted data.


CISA Warns of Attacks Exploiting Recent SharePoint Vulnerability - SecurityWeek

The Next Phase of the Defense Industrial Base

Allison Giddens; President, Operations (SMB Manufacturing) | Community Volunteer | Humorist | Author


The DIB continues to evolve as do the regulations, requirements and environment. This article explores many of the current issues such as CMMC markings, CMMC C3PAO resources and supply chain requirements.


https://www.linkedin.com/pulse/next-phase-defense-industrial-base-allison-giddens-duwpe/

Is That Guy Filming You With His Glasses? Here's How to Tell



https://www.cnet.com/tech/mobile/how-to-identify-smart-glasses/

7 factors impacting the cyber skills gap


For many CISOs, filling cybersecurity needs is becoming increasingly difficult. Here are some key trends driving the cyber skills gap today — and how IT security strategies are getting in the way of solutions.


https://www.csoonline.com/article/4137580/7-factors-impacting-the-cyber-skills-gap.html

Why scammers say nothing when they call - and how to respond safely


There's a reason scammers don't say anything when they call you, at least not right away. Here's how to deal with these sneaky calls.


https://www.zdnet.com/article/why-scammers-call-you-say-nothing-how-to-respond-safely

If your organization needs assistance meeting Federal or Department of Defense cyber security requirements, contact Marc Violante, Director of Federal Market Strategies at marcv@wispro.org, or Matt Frost, Government Contract Specialist at mattf@wispro.org

OTHER NEWS

Announcing New Sessions

Previously Cyber Fridays, Now Thursdays


If you are currently, or are planning to be, a contractor or subcontractor supporting the Defense Industrial Base (DIB) you are required to comply with the newly finalized CMMC requirements. 




Registration and more information can be found at wispro.org/wpi-events/featured-webinars

  • Be sure to follow WPI on social media (Facebook, LinkedIn, X) for regular updates on events, news and opportunities.
WPI 10437 Innovation Dr. Suite 320, Milwaukee, WI 53226 414-270-3600
Newsletter Editor: Doug Clemons, dougc@wispro.org 
Facebook  Linkedin  X

Not currently a subscriber to WPI's Newsletters?

Click Here to Subscribe