wireless3

iPhone Hacked… Update Immediately

To Update or Not Update…That is the Question We often hear that updates are available for our computers and smart phones, and often we ignore them. If you have an iPhone you had better pay attention and not pass up this update.  Heather Kelly writes “Security researchers on Thursday announced they had discovered a new […]

0 comments
Credit Cards

Financial Industry’s Concerning State of Cybersecurity

Today, organizations across every industry are concerned about security breaches and data hacks, but cybersecurity has become of utmost importance for certain sectors. Research and Markets recently revealed that over the next four years, the global cybersecurity market is expected to grow from $122.45 billion to $202.36 billion – marking an annual increase of more […]

0 comments
temp-news-big

NYT Hacked

Fool me twice shame on me… Numerous news sources are reporting today that the New York Times has once again been hacked by foreign intruders, and, fingers are being pointed at the Russians as the source of the attack.  This attack comes fresh on the heels of earlier cyber attacks…also blamed on Russian Intelligence…on the […]

0 comments

Intrusion Detection Systems (IDS): Finally for the Vehicles Part 2

In my last blog I discussed the issues with automotive security and what might be done to reduce vulnerabilities. In Part 2 I will take a closer look at a potential solution with an IDS that may be the answer. I mentioned that…”..the tool looks for anything unusual or an anomaly…” Tool With this level […]

0 comments

Intrusion Detection Systems (IDS): Finally for the Vehicles

Vehicles have notoriously been vulnerable to attack from various sources. These have varied from the equipment, endpoints, and communication being insecure to open ports. Regardless of the source, these have historically and continue to provide ample attack surfaces for those with malicious intent. Engineers in the automotive industry have attacked this issue from the defensive […]

0 comments
nuclear

Cybersecurity Challenge: Protecting Electric, Power, and Utilities

Spear-phishing email attacks, malware and viruses have been identified as a way hackers aim to gain access to power plants, oil and gas firms and steel mills. When it comes to cyberattacks and data breaches, most people think about computer network security. But it is important to realize cybercriminals can – and do – target […]

0 comments
broken_cyber_lock

What to Do? Breach Response

Years ago, a business could plan to secure its enterprise. The IT department would harden the system and in most cases there would be a reasonable assurance the enterprise was relatively safe. Things have changed as technology has improved. This improvement has come at a price. The speed of advancement has not been the easiest […]

0 comments
Cybersecurity affects almost every industry and the health care industry is not immune to cyberattacks.

Advocate Health Care Settles Potential HIPAA Penalties for $5.55 Million

The latest settlement for a potential HIPAA violation provides us with another example of the consequences of not conducting and documenting a comprehensive risk analysis and having a risk management plan. http://www.hhs.gov/about/news/2016/08/04/advocate-health-care-settles-potential-hipaa-penalties-555-million.html# According to the Open Group Standard Risk Analysis, a risk analysis is the evaluation component of the risk assessment process. The analysis is […]

0 comments

The Community College Cybersecurity Summit (3CS) Recap

The Community College Cybersecurity Summit (or 3CS) was held in Pittsburg in July. This conference, while targeted at community colleges offered several sessions that would appeal to university faculty, cybersecurity practitioners, and government. What differentiates this conference from most other cybersecurity conferences is the wealth of hands-on, innovative, and collaborative sessions. This is the place […]

0 comments

The National Cyber Summit Recap

The National Cyber Summit (NCS) June 7-9, 2016 in Huntsville, Alabama was one of the best cybersecurity conferences I have attended. The conference included many sessions ranging from paper presentations, new technology overviews, and hands-on workshop sessions. The keynote speakers were knowledgeable, funny, and engaging, and included Lt. Gen. Edward Cardon, Commander US Army Cyber […]

0 comments