Law Firms Not Exempt from Cyber Breaches

Nearly every organization is subject to cyber attacks and the loss of sensitive information that can result. Law firms are no exception. A great deal of sensitive material is naturally kept within... [ read more ]

Health Care Breach Affects 4.5 Million Americans

The relentless assault by hackers on the cyber systems of the nation continues to escalate as news comes of yet another cyber breach that will affect millions of Americans. According to just-released... [ read more ]

Congress Takes Action on Cyber Bill

It’s a bit of a rarity these days when Congress is able to compromise on legislation. However, on July 28 the House passed H.R. 3693, a bill known as the National Cybersecurity... [ read more ]

Handle Sensitive Information Differently

If you have highly sensitive information, think about an entirely different way of handling it from your normal email, collaboration, and other systems. If it is the kind of information that can... [ read more ]

Use USB Only for Personal Use!

I saw some great advice in an article about USB – pretend they are your toothbrush and share accordingly. USBs are amazing devices and the amount you can store on them is... [ read more ]

Who is Behind Your Firewall?

Having only a perimeter defense is a bad idea, but knowing who is inside your company’s network is a key component of a solid defensive approach to cyber-security. Over the years, your... [ read more ]

NCI’s Black Hat 2014 Wrap Up

On Tuesday, 5 August, the Black Hat 2014 training sessions were being wrapped up during the evening sessions. There were a number of topics that security experts were attending during the first... [ read more ]

Nuclear Cybersecurity: Supply Chain Management Webinar

Join us August 22, 2014 from 11:00 AM to 12:00 PM (ET) Industries that procure systems in support of critical infrastructure need requirements in place to verify that suppliers have enacted internal... [ read more ]

What If Your Password Is Compromised?

Co-Authored by NCI Fellows James Antonakos and Scott Gilreath We’ve been hearing a lot lately about passwords being compromised and stolen by hacker. But what happens if your password is stolen? Sometimes nothing happens. The hacker... [ read more ]

Steganography Webinar

Join us Tuesday, August 19, 2014, 3:00 PM to 4:00 PM (EDT) When you look at a digital image of a flower, do you ever consider that there might be a data... [ read more ]