Seven Issues to Address When Securing Your Remote Workforce

|
The coronavirus pandemic has brought us to a watershed moment in cybersecurity, as institutions have moved in a matter of days to “work from home” on a scale we’ve never seen before. Hackers have been right at workers’ heels in this move. Many organizations are not currently prepared to ensure ... Read More

PreVeil Offers Service for Free to Help Critical Infrastructure Institutions

|
As a public service effective today, PreVeil is offering its encrypted email and file-sharing solutions at no charge to critical infrastructure institutions battling the coronavirus crisis, including: Federal, state and local governments and agencies First responders and crisis management teams Healthcare non-profits Higher-ed institutions We are pleased to make this ... Read More
juliette kayyem

PreVeil, Cybersecurity and the Covid-19 Work From Home Rush

|
This piece was was written by Juliette Kayyem, former Asst. Sect. at DHS and CNN security analyst. It originally appeared on LinkedIn. Coronavirus spread silently through the United States for weeks, if not months, and early last week that silent transmission turned into something that’s impossible to ignore. Institutions ranging ... Read More
2_Campaign Security

Election 2020: Cybersecurity and PreVeil

|
US elections should be decided by US citizens. But digital attacks have found US campaigns and elections vulnerable. In his RSA 2020 keynote in San Francisco last month, Admiral James Stavridis, PreVeil board member and former Supreme Allied Commander of NATO, said, “my confidence is high that the Russians are ... Read More
What are the 5 levels of CMMC?

What are the 5 levels of CMMC?

|
The Department of Defense (DoD) built the Cybersecurity Maturity Model Certification (CMMC) framework to better assess and improve the cybersecurity posture of the Defense Industrial Base (DIB). CMMC’s purpose is to ensure that appropriate levels of cybersecurity practices and processes are in place to protect federal contact information (FCI) and ... Read More
Sony Hack

Sony vs North Korea: When Nation States Attack Private Firms

|
In their keynote address at last month’s big RSA conference in San Francisco, PreVeil board member Admiral James Stavridis and Harvard’s Juliette Kayyem looked at the story of North Korea’s hack of Sony. Hacking attacks by nation states are a particular problem for firms in the defense industry and institutions ... Read More

It’s Past Time to Actively Stop Evil Hackers

|
Wall Street Journal, Letters to the Editor February 29, 2020 Insecure communication systems let hackers infiltrate executive accounts remotely via phishing attacks or attacks on passwords or even on servers. (“Hackers Aid Rise in Wire Transfer Scam,” Business and Finance, Feb. 24). From there, they can learn and mimic the ... Read More
My keynote for this year’s RSA

My keynote for this year’s RSA

|
The costs and consequences of malicious cyber-activity are impossible to put a price tag on, as bad actors pose threats in all aspects of our personal, public and political lives. The post My keynote for this year’s RSA appeared first on PreVeil ... Read More
CMMC logo

What is new in CMMC v0.7?

| | CMMC, PreVeil
Last Friday, the Under Secretary of Defense for Acquisition and Sustainment (USD A&S) released draft 0.7 of the Cybersecurity Maturity Model Certification (CMMC) framework. The primary purpose of this newest draft was to provide guidance on practices for Levels 4 and 5. Version 0.7 also provided some clarification on maturity ... Read More
What are Man-in-the-Middle (MITM) Attacks?

What are Man-in-the-Middle (MITM) Attacks?

| | Data Ownership, PreVeil
On the internet, we believe we know who we are communicating with. And, for the most part, we are pretty sure when we send a message to a colleague that our colleague is answering the request. But, can we be sure? Could an attacker insert themselves in between our communication ... Read More
Loading...