iPhone Hacked… Update Immediately

To Update or Not Update…That is the Question We often hear that updates are available for our computers and smart phones, and often we ignore them. If you have an iPhone you had better pay attention and not pass up this update. ...  [Read More]

Financial Industry’s Concerning State of Cybersecurity

Today, organizations across every industry are concerned about security breaches and data hacks, but cybersecurity has become of utmost importance for certain sectors. Research and Markets recently revealed that over the next four years, the global cybersecurity market is expected to grow...  [Read More]

NYT Hacked

Fool me twice shame on me… Numerous news sources are reporting today that the New York Times has once again been hacked by foreign intruders, and, fingers are being pointed at the Russians as the source of the attack.  This attack comes...  [Read More]

Intrusion Detection Systems (IDS): Finally for the Vehicles Part 2

In my last blog I discussed the issues with automotive security and what might be done to reduce vulnerabilities. In Part 2 I will take a closer look at a potential solution with an IDS that may be the answer. I mentioned...  [Read More]

Intrusion Detection Systems (IDS): Finally for the Vehicles

Vehicles have notoriously been vulnerable to attack from various sources. These have varied from the equipment, endpoints, and communication being insecure to open ports. Regardless of the source, these have historically and continue to provide ample attack surfaces for those with malicious...  [Read More]

Cybersecurity Challenge: Protecting Electric, Power, and Utilities

Spear-phishing email attacks, malware and viruses have been identified as a way hackers aim to gain access to power plants, oil and gas firms and steel mills. When it comes to cyberattacks and data breaches, most people think about computer network security....  [Read More]

What to Do? Breach Response

Years ago, a business could plan to secure its enterprise. The IT department would harden the system and in most cases there would be a reasonable assurance the enterprise was relatively safe. Things have changed as technology has improved. This improvement has...  [Read More]

Advocate Health Care Settles Potential HIPAA Penalties for $5.55 Million

The latest settlement for a potential HIPAA violation provides us with another example of the consequences of not conducting and documenting a comprehensive risk analysis and having a risk management plan. http://www.hhs.gov/about/news/2016/08/04/advocate-health-care-settles-potential-hipaa-penalties-555-million.html# According to the Open Group Standard Risk Analysis, a risk...  [Read More]

The Community College Cybersecurity Summit (3CS) Recap

The Community College Cybersecurity Summit (or 3CS) was held in Pittsburg in July. This conference, while targeted at community colleges offered several sessions that would appeal to university faculty, cybersecurity practitioners, and government. What differentiates this conference from most other cybersecurity conferences...  [Read More]

The National Cyber Summit Recap

The National Cyber Summit (NCS) June 7-9, 2016 in Huntsville, Alabama was one of the best cybersecurity conferences I have attended. The conference included many sessions ranging from paper presentations, new technology overviews, and hands-on workshop sessions. The keynote speakers were knowledgeable,...  [Read More]