Hacking Democracy: Vulnerable Voting Infrastructure and the Future of Election Security

Hacking Democracy: Vulnerable Voting Infrastructure and the Future of Election Security

It’s been two years since international interference sabotaged the United States’ election security, and still the vulnerability of our voting infrastructure remains a major problem. This past May, during Tennessee’s primary election, the Knox County election website fell prey to a DDoS attack. And just days ago, Texas voters experienced ... Read More
Protecting Sensitive Data: A Black Swan Never Truly Sits Still

Protecting Sensitive Data: A Black Swan Never Truly Sits Still

The black swan – a rare and unpredictable event notorious for its ability to completely change the tides of a situation. For cybersecurity, these nightmares can take the form of disabled critical services such as municipal electrical grids and other connected infrastructure networks, data breaches, application failures, and DDoS attacks ... Read More
Protecting Sensitive Data: The Death of an SMB

Protecting Sensitive Data: The Death of an SMB

True or False? 90% of small businesses lack any type of data protection for their company and customer information. The answer? Unfortunately true. Due to this lack of care, 61% of data breach victims are specifically small businesses according to service provider Verizon’s 2018 Data Breach Investigations. Although large corporations ... Read More
Protecting Sensitive Data: What a Breach Means to Your Business

Protecting Sensitive Data: What a Breach Means to Your Business

Data breaches have made big headlines in recent years, from Target to Equifax to Hudson’s Bay Co’s Saks and Lord & Taylor. But the growing trend is actually in all the litigation stemming from data breaches. International law firm Bryan Cave analyzed the increasing trend of legal action following data ... Read More
The Hybrid Cloud Habit You Need to Break

The Hybrid Cloud Habit You Need to Break

A little while ago, security professionals from my firm watched as hackers began probing the network of a large financial institution. The hackers took their time, poking here, prodding there, until they had a pretty good idea of the shape of things. The company recognized their incumbent security solution had ... Read More
Hackers Remotely Kill a Jeep on a Highway | WIRED

The 7 Craziest IoT Device Hacks

| | Hacking, iot, security
Internet of Things (IoT) botnets have forever changed cyber-security. When an IoT botnet – which is a group of internet-connected computers, appliances or devices that have been co-opted to launch a cyber-attack – is unleashed, the results can be devastating. Nearly any internet-connected device can be considered an IoT device ... Read More
Loading...