behind the firewall


All too often, cyber space seems a vast and unregulated "Wild West," where anarchy is the norm and criminal justice remains by-and-large a concept rarely enforced. What's more, the Internet cloaks cybercriminals under a blanket of anonymity, where they have the ability to take down international governments and large-scale corporations at the touch of a button from any where in the world. It's no secret that the "lawless" nature of cyberspace has become an accepted status-quo - so much so that high-profile cybercrime, international privacy breaches... [Read More]
by RSS Stefanie Hoffman  |  Jan 30, 2014  |  Filed in: Business and Technology
As any competitive athlete can attest, if you want to win any game, you first have to understand the players. That's the premise behind ethical hacking. Frequently depicted in books and espionage thrillers as shadowy and mysterious, ethical hackers often appear to occupy a moral gray area - possessing the ability to commit nefarious crimes but instead applying their brilliance and technical acumen for the pursuit of justice. So who are these guys, anyway? As the name suggests, the practice of ethical hacking trains individuals to fight cybercrime... [Read More]
by RSS Stefanie Hoffman  |  Dec 26, 2013  |  Filed in: Business and Technology
The fair land of Scotland might seem an unlikely place to boost expertise and revolutionize tactics aimed at apprehending criminals. However, police departments and detectives in England's neighbor to the north are helping reshape the agency's direction a bit by bulking up their cyber security acumen. And they're turning to the research community to do so. According to the Edinburgh News, Scottish law enforcement agents have adopted a new Digital Investigator course into their curriculum, facilitated by cyber security experts at Edinburgh Napier... [Read More]
by RSS Stefanie Hoffman  |  Nov 21, 2013  |  Filed in: Business and Technology
_Behind the Firewall is an ongoing series that explores the stories of individuals and organizations in their use of firewall technology. Recently, a user on twitter reached out to us and told us about his home networking story. _ Darin Cowan was a security consultant for nearly 20 years before taking a job as the manager of corporate security at a Canadian financial institution. Darin's experience in the industry has enabled him to build an impressive home network that seconds as a lab for testing and continued consulting purposes. His impressive... [Read More]
by RSS Michael Perna  |  Nov 04, 2013  |  Filed in: Business and Technology
It is fair to say that most remote and traveling workers know that no public Wi-Fi hotspot is, or will ever be, deemed completely safe. But these days, that rings especially true for Windows Phone users when connecting to public wireless networks. Earlier this month, Microsoft issued an advisory warning users that a critical flaw in Windows Phone 7.8 and 8 could leave users susceptible to password theft when connecting to rogue Wi-Fi networks. Specifically, the flaw resides in a Wi-Fi authentication mechanism -- PEAP-MS-CHAPv2 - which enables... [Read More]
by RSS Stefanie Hoffman  |  Sep 26, 2013  |  Filed in: Business and Technology
More often than not, malware stealthily infects systems and lifts valuable data long before it is ever detected, let alone eliminated. That said, it's not surprising that some of the most pernicious threats often go underestimated, or are dismissed altogether. But what happens when the opposite is true, when fear and panic surrounding malware come to a dramatic crescendo - so much so that users place valuable resources and security dollars into fighting a costly, but non-existent, threat? That was a hard lesson to learn for one Commerce Department... [Read More]
by RSS Stefanie Hoffman  |  Aug 01, 2013  |  Filed in: Business and Technology