It only takes 6,000 smart phones to take down our Public Emergency Response System?

It only takes 6,000 smart phones to take down our Public Emergency Response System?

There are fewer scenarios which illustrate an evildoer’s heart than those designed for mass carnage. We are all familiar with the false alarm (human mistake) of the Public Emergency Broadcast system in Hawaii earlier this year, which wreaked havoc throughout the archipelago. However, do we realize how fragile our nation’s ... Read More
2018: Snapshot of the Most Important Worldwide Cybersecurity Laws, Regulations, Directives and Standards

2018: Snapshot of the Most Important Worldwide Cybersecurity Laws, Regulations, Directives and Standards

Are you out of breath from the breakneck pace of cyberattacks since the start of 2018? Throughout the world, nearly daily news reports have been filed detailing the results of incredibly effective cyberattacks ranging from small companies to nation-states. The sum total of these attacks has permanently and dramatically changed ... Read More
Federal CISO: Superhero Needed

Federal CISO: Superhero Needed

A famous leadership coach said, “Only Superman can leap tall buildings in a single bound, the rest of us must chip away at our goals one day at a time.” What a befitting quote for the position of Federal CISO! This role of organizing, equipping, training and leading the nation’s ... Read More
New Threat Landscape Gives Birth to New Way of Handling Cyber Security

New Threat Landscape Gives Birth to New Way of Handling Cyber Security

With the growing online availability of attack tools and services, the pool of possible attacks is larger than ever. Let’s face it, getting ready for the next cyber-attack is the new normal! This ‘readiness’ is a new organizational tax on nearly every employed individual throughout the world. Amazingly enough, attackers ... Read More
IT Can Be a Creepy Clown: Five Things That Keep Me Up At Night

IT Can Be a Creepy Clown: Five Things That Keep Me Up At Night

If you are a security professional like me, you probably wind up speaking passionately about an attack vector, a cyber-incident or trends in information security from time-to-time. As such, you probably get approached to opine on a summary of what frightens you the most, and how to drive to sum ... Read More
What Does a Windstorm in Wyoming Have to Do with Cyber Security?

What Does a Windstorm in Wyoming Have to Do with Cyber Security?

Natural disasters serve as excellent examples of the unforeseen consequences that a cyber-attack against infrastructure will have. Take for example a strong windstorm in Wyoming in February 2017. The storm knocked down power lines, forcing water and sewage treatment plants to operate on backup generators, which weren’t available to some ... Read More
Cyber Security Predictions

Cyber Security Predictions

2016 was the Year of DDoS. 2017 was the Year of Ransom. Can we assess leading indicators of new attack techniques and motivations to predict what 2018 will bring? The answer is a resounding “yes.” We believe 2018 will be the Year of Automation—or, more precisely, big, bad attacks on ... Read More
Pandora’s Box: Auditing for DDoS Vulnerabilities, Part II

Pandora’s Box: Auditing for DDoS Vulnerabilities, Part II

The Rise of the “Availability Vulnerabilities” Availability problems aren’t necessarily unique; however, the testing is certainly different. This “availability security problem” is resulting in an increased risk to enterprises whose business models are tied to time (government elections, financial trading, online promotional retailers, insurance reconciliations, etc.). As a result, many ... Read More
Pandora’s Box: Auditing for DDoS Vulnerabilities, Part I

Pandora’s Box: Auditing for DDoS Vulnerabilities, Part I

THE BUSINESS PROBLEM: Your company has reason to believe that it may be attacked in the near future or recently has come under attack. The main questions that come to mind: – How do I know if the attackers will be successful? – How can I test my environment myself ... Read More
2017’s 5 Most Dangerous DDoS Attacks & How to Mitigate Them (Part 2)

2017’s 5 Most Dangerous DDoS Attacks & How to Mitigate Them (Part 2)

This is Part 2 of our series on the top 5 most dangerous DDoS attacks and how you can successfully mitigate them. To read Part 1 of the series, click here. Let’s dive back in with Attack Type #4: ATTACK TYPE #4: Fire & Forget: PDoS – Permanent Denial of ... Read More
Loading...