Government Requests for Information from Google

Careful what you search for… Until Edward Snowden blew the whistle on government spying, most Americans were blissfully unaware of how much of our personal lives is monitored by ‘Big Brother’ in the guise of national security. His alarming revelations made headlines...  [Read More]

Everyone is a Target

We have all seen the headlines where a major business like SONY, Target or Home Depot have had their digital systems breached. While these breaches are serious and newsworthy, they unfortunately fail to inform the general public of the larger threat that...  [Read More]

CloudGenix Software Defined WAN Webinar

Federal institutions are now able to take full advantage of cloud-based applications and QoS over any network without compromise. Software-driven architectures are transforming IT meeting fundamental compliance and security requirements. In this webinar you will hear from industry experts on how to...  [Read More]

Cybersecurity is about People, Not Just Processes

It has become abundantly clear that the issue of cybersecurity is not going away anytime soon. Every day, it seems that the number of vulnerabilities and risks organizations are susceptible to increases, yet the amount of solutions we have to defend against...  [Read More]

Here We Go Again: Lenovo and Another Security Issue aka ThinkPwn

Within the last year, there have been approximately five problematic issues with a certain laptop manufacturer’s units. Lenovo has had their security lapses over time. Some are more well-known than others. The latest occurred in November 2015 with a problem in the...  [Read More]

Useful Data Breach Recovery Metrics for Small Businesses

Just because your business has suffered a cyber-attack once, doesn’t mean it won’t suffer another one. Businesses that take their cyber security efforts to the next level are planning their attack recovery metrics. By measuring key factors, the business improves it chances...  [Read More]

Pokémon….Go or No Go?

The headlines regarding the newest cyber craze ‘Pokémon Go’ can be very troubling: “Armed Robbers Used ‘Pokémon Go’ App to Lure Victims, Police Say” “Sex offender nabbed playing ‘Pokémon Go’ with kid” “Death by Pokémon? Public safety fears mount as ‘Pokémon Go’...  [Read More]

Cybersecurity Small Book Series Published

National Cybersecurity Institute is excited to announce the publication of new Cybersecurity Small book series. These three books cover different aspects of the field of cyber security. SMALL BUSINESS AND NONPROFITS Cybersecurity for Small Businesses and Nonprofits is a must-read for the...  [Read More]

Dude, Where’s My Car? Vehicle Hacking Trends & Analysis #14

Defenses As the vehicle advanced in its application of technology, it has become more connected. This has increased the attack points and vulnerabilities. The market has produced a vast number of persons interested in looking for these to report. Although these continue...  [Read More]

Study Highlights Source of Health Care Security Vulnerabilities

It seems as if very few industries, and even fewer businesses, are confident in their overall ability to adequately respond to and defend against cyberattacks. But some sectors are significantly more ill-prepared than others. A new university study was just released that...  [Read More]