Coronavirus cyber considerations – six key factors for securing a remote workforce

With more than 4,000 reported cases, and many more anticipated by health and infectious disease experts, the Coronavirus (COVID-19) has many Americans changing their behavior, stocking up on necessities and quarantining themselves in their homes for fear of contracting the…

Three key DDoS findings from the NETSCOUT Threat Intelligence Report

While the seemingly increasing rash of ransomware attacks impacting government organizations and entities has dominated much of the news cycle, there is another threat that is less trendy but equally harmful to government organizations. That threat is the Distributed Denial…

Six cybersecurity trends to watch in 2020

Earlier this month, global endpoint security provider, CrowdStrike, released their Services Cyber Front Line Report. This year’s version of the report looks at key cybersecurity trends and themes that the company observed while responding to and remediating the global threats…

Mobile devices – convenience, security risk or both?

Cell phones, tablets, wearables and other mobile devices dominate our lives. I personally bring my trusty iPad to everywhere, and, like everyone else, have my phone with me at all times. The biggest attack surface for any enterprise, then, may…

Mid-Year OverWatch Report finds ransomware and phishing on the rise in 2019

In a trend that many that have been watching the news may not find a surprise, in the first half of 2019, ransomware attacks and phishing attempts are continuing the rise in popularity that they enjoyed in 2018. Much of…

Phishing – why humans are the biggest security vulnerabilities

Phishing, vishing, whaling, spear-phishing: the list of clever new terms seems constantly to change. A successful attack by any other name, though, is just as sweet to the adversary. Terminology aside, the fundamental problem is this. Phishing is the most…

Ten steps to avoiding ransomware

Recently, 22 different cities across the State of Texas were hacked and hit with simultaneous ransomware attacks – attacks where computer systems or data are effectively held hostage for a monetary ransom. And Texas isn’t the only victim. According to…

Solid foundations + innovation = stout cybersecurity

Every security professional knows that the adversary has the advantage. We have to find every vulnerability and remediate it, and the enemy only needs to find one vulnerability and exploit it. This asymmetry underlies their economic advantage: finding one vulnerability…

Why security takes a backseat in IoT devices

The “Internet of Things,” or IOT: we’ve all heard the term, but what does it really mean? More importantly, how do we secure all of these … “things”? First, a stab at defining the term and its components. The term…

What Steps Can the Military Take to Secure Weapon Systems?

Today’s military platforms and weapon systems are increasingly network and software-enabled, which is helping to make them more effective and efficient tools for the warfighter, but is opening them up to a new avenue of attacks that less connected and…