Wall Street Escapes Digital Bomb

Even the thought of a cyber attack on Wall Street should be enough to send shivers through the financial community. Yet the possibility of such an attack is real, has already happened,... [ read more ]

Cyber Threat is Not a Normal Risk

The risk of a major cyber-attack is unique. Without warning, your organization can be devastated – operationally hamstrung through denial of service attacks; intellectual property drained; and sensitive information stolen, destroyed, or... [ read more ]

Cyber-Intelligence Gathering Can Stave Off Attacks

Being aware of all the emerging threats and newly discovered vulnerabilities, along with updates on new and existing adversaries, is an important tool in your defense in depth strategy.   Many attacks are... [ read more ]

Building Cyber Resilience

Your organization is going to be attacked/breached by cyber attackers – a recent Fireeye paper put the percentage at 97% – see Cybersecurity’s Maginot Line: A Real-world Assessment of the Defense-in-Depth Model.  The... [ read more ]

Lessons Learned From a Password Manager

Have you always wondered about using that online password management system that you keep seeing advertised on websites you visited? Or do you already use a web based online password manager account... [ read more ]

Outside Validation of Cyber Plans is Vital

It is important to get an outside opinion of your cyber strategy and defenses. While your organizational staff will likely have worked hard and spent long hours building robust cyber defense capabilities, an... [ read more ]

Buying a Ferrari Does Not Make You a Race Car Driver!

There are some very effective tools being sold to help organizations develop their cyber defense-in-depth strategy. Traditional companies have ramped up their offerings, and there are a host of venture-backed startups addressing... [ read more ]

Ho-Hum…the Wall Street Journal is Hacked

The Wall Street Journal announced today that it was shutting down ‘some’ of its online systems due to a breach of its cyber security. Posted at the Journal’s website online.wsj.com, writers Gregory... [ read more ]

Torpedo in the water!

We’ve all seen black and white World War II movies where someone detects an incoming threat.  Everyone instantly goes to battle stations to start doing everything possible to immediately respond to the threat.  Organizations... [ read more ]

World Cup Of Cyber Attacks

As the Brazil FIFA World Cup 2014 moved on to the finals, sponsors, patrons, banks, and organizations suffered significant damage by way of cyber-crime. Brazil’s banks, FIFA World Cup offices, and patrons... [ read more ]

More Women in Cyber

For many years the computer field was a male’s only domain. Females could only watch over the shoulders of males as they dominated keyboards in classrooms across the nation. Now, comes interesting... [ read more ]

Do you know where your critical data is?

You are probably doing all you can and more to build in network and application security in your organization, working to minimize the threat of a devastating cyber attack that can result... [ read more ]

Taking a Bite out of Cybercrime at Restaurants

Another well known business has reported a cyber breach, this time the well known Chinese restaurant chain PF Chang’s. The business confirms the breach and indicates that cards used between March and... [ read more ]

Rogue IT – you can’t protect what you don’t know about:

Today’s tools and software as a service make high powered, widely deployed capabilities possible without the involvement of the Information Technology or Information Security groups within your organization. These types of activities... [ read more ]

Putter Panda Bites

Putter Panda sounds like a cute name and just saying it can almost bring a smile to your face, until you realize that ‘Putter Panda’ is actually a cover for the ‘People’s... [ read more ]

New Ransomware at Large

CryptoLocker, that infamous ransomware that enters your computer, locks it up, and then demands a ransom to unlock it keeps morphing into newer and nastier versions. The newest, according to CyberheistNews, is... [ read more ]

Call for Abstracts & Papers

The National Cybersecurity Institute Journal is currently extending a call for abstracts & papers, including book and software reviews, editorials and commentary in all areas of cybersecurity that contribute to understanding the... [ read more ]

BLOG Utility hacked: Keeping our guard up

Reuters News recently reported that a major utility had been the target of hackers and that inroads had been made into the utilities control system network. According to Reuters the sophisticated group... [ read more ]

Cyber Partners – important aspect of your cyber defense

Even for the largest of organizations, a major cyber-attack will demand a rapid surge in resources to muster an adequate response and recovery process. These partners can add expertise, insight, and an... [ read more ]

Preparation is the key to cyber incident response

Imagine an NFL team coming out on the field without a game plan that has been scrutinized, practiced and tightly scripted; it’s pretty much unthinkable. Despite this understanding, many organizations wait to... [ read more ]

Align the entire organization on cyber threats

Cyber threats are one of biggest risks that organizations face today, capable of completely disrupting operations, reputation and ability to function. It is imperative that the Board work with the C-Suite, the... [ read more ]

CryptoLocker ramps up attacks

So called ‘Ransom’ attacks on systems have been with us for a while now.  These attacks occur when an individual opens email to which is attached malware that locks up the computer... [ read more ]

Chinese caught in cookie jar….but what now?

On Monday, May 25th the United States Justice Department officially indicted five people in the Chinese military for spying on US businesses. Attorney General Eric Holder stated that “This is a case... [ read more ]