With all the Russian election hacking scandals in the news during and after the 2016 Presidential election, curiosity consumed me to architect and run an experiment to see if I could monitor changes in the threat landscape in either Moscow, Russia or Washington D.C. during the 2018 U.S. midterm elections. I have worked in four […]… Read More
The post Adventures of Cyber Security Monitoring During 2018 U.S. Midterm Elections appeared first on The State of Security.
Today’s increasingly connected world, with access to mobile devices and cloud scale computing, is leading to disruption in business models and processes. To succeed, you have no option but to continuously deliver new value to customers at the increasing speed that they demand. Mark Andreessen, the founder of Netscape, said a few years back that […]… Read More
The post The Top Tactics to Be Successful at Secure DevOps appeared first on The State of Security.
Most people do not regard their cybersecurity and privacy documentation as a proactive security measure. On the contrary, many oftentimes view documentation as a passive effort that offers little protection to a company, generally an afterthought that must be addressed to appease compliance efforts. Where documentation may get some much-needed attention is through Ohio’s recent […]… Read More
The post Cybersecurity Documentation: The Best Defense Is a Good Offense appeared first on The State of Security.
If you’ve been online recently, you may have read the news about hackers demanding a ransom from Dublin’s tram system. Visitors to the Luas website were greeted by the hackers’ message threatening to publish the stolen information unless they were paid one Bitcoin (approximately 3,300 Euros or US $3,800). While the message itself appeared to […]… Read More
The post Web Hosting Security Best Practices appeared first on The State of Security.
If you have ever heard of the Federal Information Security Management Act, then you are aware of the work done by the National Institute of Standards and Technology. The goal of the Act, not to mention the subsequent documents that resulted from strategies designed around implementing it, led NIST to create works designed to bolster […]… Read More
The post Securing Government Data with NIST 800-53 appeared first on The State of Security.
The Internet of Things (IoT) broadly refers to devices and equipment that are readable, recognizable, locatable, addressable and/or controllable via the internet. This includes everything from edge computing devices to home appliances, from wearable technology to cars. IoT represents the melding of the physical world and the digital worked, as sensors are not costly and wireless access is […]… Read More
The post The Imperative to Address Security Concerns of the Rapidly Evolving Internet of Things appeared first on The State of Security.
Amazon GovCloud is an isolated Amazon Web Service (AWS) designed to allow customers and the U.S government agencies to move their confidential data into the cloud to address their compliance and specific regulatory requirements. It runs under ITAR, the U.S. International Traffic in Arms Regulations. With this cloud service, US citizens can run workloads that […]… Read More
The post What is Amazon GovCloud? appeared first on The State of Security.
The cybersecurity space is in dire straits. Hackers are getting smarter and more sophisticated…and the availability of skilled men and women to combat them has never been lower. It’s an issue that’s been slowly growing worse year over year, yet there’s no clear solution in sight. What’s a business leader to do? The good news […]… Read More
The post Addressing The Elephant in the Room: Cybersecurity’s Increasing Talent Shortage appeared first on The State of Security.
With the majority of people using smartphones these days, texting is all but a given when trying to communicate with your friends or family. But what about your doctor? A recent study determined that 96 percent of physicians use text messaging for coordinating patient care. This can raise eyebrows and red flags. Anyone with a […]… Read More
The post What You Need to Know About Secure Mobile Messaging in Healthcare appeared first on The State of Security.
This article covers the main techniques cybercriminals use at the initial stage of attacks against enterprise networks. There are several dangerous phases of cyberattacks targeting the corporate segment. The first one encountered by businesses boils down to getting initial access into their systems. The malefactor’s goal at this point is to deposit some malicious code […]… Read More
The post How Cybercriminals Are Getting Initial Access into Your System appeared first on The State of Security.