MCP Insights

Subscribe to Newsletter

CAPS 2025 Spotlight: A Must-See Message from MCP CEO Darrin Reilly

During this month’s Conference for Advancing the Public Sector (CAPS) 2025, Darrin Reilly, Mission Critical Partners’ president and CEO, was the focus of one of the virtual event’s most eye-opening sessions. In a fast-moving and wide-ranging conversation, Darrin unpacked the forces reshaping the public sector and explained why this moment in time might be the most pivotal in decades. He offered perspectives on:

Cybersecurity Threat Advisory: Veeam Backup & Replication – Multiple Vulnerabilities

As part of our effort to inform our clients about potential and serious cybersecurity issues, MCP provides advisories about vulnerabilities and exploits that could threaten the operations of their critical communications networks. Sign up to receive these advisories in your inbox as soon as they are released.

Strengthening Cybersecurity Through a GRC Lens: Key Practices Aligned with CJIS Security Policy 6.0

As cyber threats grow more sophisticated, compliance frameworks like the Criminal Justice Information Services (CJIS) Security Policy, version 6.0, have evolved to demand a more rigorous and structured approach to cybersecurity.

Topics: Cybersecurity

How a Change-Control Board Can Help You Comply with the CJIS Security Policy Mandate

The 2024 updates to the Criminal Justice Information Services (CJIS) security policy mark a significant shift, clearly focusing on enhancing configuration management. From maintaining accurate baseline configurations to ensuring comprehensive change control, these updates aim to strengthen how public-safety and justice organizations manage their systems and data.

Topics: Cybersecurity

Inside the New CJIS Security Policy Requirements: What You Need to Know

The 2024 update to the Criminal Justice Information Services (CJIS) security policy introduces several new requirements designed to enhance data protection and compliance.

Topics: Cybersecurity

Cybersecurity Threat Advisory: Microsoft SharePoint Deserialization Vulnerability

As part of our effort to inform our clients about potential and serious cybersecurity issues, MCP provides advisories about vulnerabilities and exploits that could threaten the operations of their critical communications networks. Sign up to receive these advisories in your inbox as soon as they are released.

Topics: Cybersecurity

Cybersecurity Awareness Month: Best Practices for Vulnerability Scanning and Management

October is Cybersecurity Awareness Month—a perfect time for public sector organizations to revisit their cybersecurity strategies and strengthen their defenses. Our previous blog discussed best practices for executing multifactor authentication, a cornerstone of strong security.

Topics: Cybersecurity

CAPS 2024 continues MCP’s long tradition of thought leadership

There are many things of which we’re proud, starting with our collective ability to transform emergency-response and justice outcomes throughout the decade and a half that MCP has existed.

Cybersecurity Threat Advisory: Intrado 911 Emergency Gateway

As part of our effort to inform our clients about potential and serious cybersecurity issues, MCP provides advisories about vulnerabilities and exploits that could threaten the operations of their critical communications networks.

Topics: Cybersecurity

CJIS-Mandated Vulnerability-Management Deadline is Fast Approaching — Are You Ready?

Last December, the FBI’s Criminal Justice Information Services (CJIS) division issued a mandate that law-enforcement organizations wanting to access its databases must have a cybersecurity vulnerability-management program in place by October of this year.

Key Takeaways from IWCE 2024 — Part 2

In a previous post, we shared key observations of MCP subject-matter experts who recently attended the International Wireless Communications Expositions (IWCE). Here are a few more.

Updated NIST Cybersecurity Framework Places Greater Emphasis on Governance

The Cybersecurity Framework (CSF) developed in 2014 by the National Institute of Standards and Technology (NIST) has proved quite valuable. It is organized according to five key, easily understandable Core Functions: Identify, Protect, Detect, Respond, and Recover.

Topics: Cybersecurity