Hacking Democracy: Vulnerable Voting Infrastructure and the Future of Election Security
It’s been two years since international interference sabotaged the United States’ election security, and still the vulnerability of our voting infrastructure remains a major problem. This past May, during Tennessee’s primary election, the Knox County election website fell prey to a DDoS attack. And just days ago, Texas voters experienced ... Read More
Protecting Sensitive Data: A Black Swan Never Truly Sits Still
The black swan – a rare and unpredictable event notorious for its ability to completely change the tides of a situation. For cybersecurity, these nightmares can take the form of disabled critical services such as municipal electrical grids and other connected infrastructure networks, data breaches, application failures, and DDoS attacks ... Read More
Protecting Sensitive Data: The Death of an SMB
True or False? 90% of small businesses lack any type of data protection for their company and customer information. The answer? Unfortunately true. Due to this lack of care, 61% of data breach victims are specifically small businesses according to service provider Verizon’s 2018 Data Breach Investigations. Although large corporations ... Read More
Protecting Sensitive Data: What a Breach Means to Your Business
Data breaches have made big headlines in recent years, from Target to Equifax to Hudson’s Bay Co’s Saks and Lord & Taylor. But the growing trend is actually in all the litigation stemming from data breaches. International law firm Bryan Cave analyzed the increasing trend of legal action following data ... Read More
The Hybrid Cloud Habit You Need to Break
A little while ago, security professionals from my firm watched as hackers began probing the network of a large financial institution. The hackers took their time, poking here, prodding there, until they had a pretty good idea of the shape of things. The company recognized their incumbent security solution had ... Read More
The 7 Craziest IoT Device Hacks
Internet of Things (IoT) botnets have forever changed cyber-security. When an IoT botnet – which is a group of internet-connected computers, appliances or devices that have been co-opted to launch a cyber-attack – is unleashed, the results can be devastating. Nearly any internet-connected device can be considered an IoT device ... Read More