cyber security | Page 4

When some people look at a map of Westeros they see a land of war, intrigue, and magic. We see a network security schematic. Seriously. Yes, Season 5 of Game of Thrones is almost here. And yes, we’re at least as excited as you are. Will Stannis Baratheon actually take the North? What new adventures will Arya find when she gets to Braavos? What will be the fallout from Tywin Lannister’s death? Can HBO add even more gratuitous sex and violence that wasn’t in the books? Probably not...the books aren’t exactly up for Caldecott... [Read More]
by RSS Chris Dawson  |  Apr 01, 2015  |  Filed in: Industry Trends
The Premera Blue Cross hack is a reminder of the treasure trove healthcare data represents to hackers. Bank account information. Physical addresses. Email addresses. Social Security numbers. Clinical information...All exposed in the latest healthcare cyberattack. This time the target was Premera Blue Cross, a Pacific Northwest health insurer, which reported Tuesday that up to 11 million patient records had been breached. According to Premera, the breach was discovered on January 29th, the same day that Anthem Blue Cross uncovered a breach... [Read More]
by RSS Ryan Witt  |  Mar 18, 2015  |  Filed in: Industry Trends
The games have began and we aren't just talking about football. Unsolicited emails: Beware of spam emails that say you're the lucky winner of a lottery for two free tickets to the World Cup, or promises to give you free access to Websites that let you watch the matches live. By clicking on those links, you could be taken to compromised Websites that download malware onto your computer. That malware could be used as a keylogger to retrieve all of your personal information, including passwords and other credentials; it could be used to download... [Read More]
by RSS Guillaume Lovet  |  Jun 18, 2014  |  Filed in: Industry Trends
Generally, one would not think of the CES show in Las Vegas as having an impact on the security market, but this year is different. Amidst the deluge of new product announcements, there appears to be a consistent theme - the Internet of Things is dawning. We stand at the cusp of a new era where anything and everything will be connected by an IP address. From connected cars to connected homes, wearable computers to WiFi-enabled toothbrushes - everything around us will soon be able to create and share data. So, what does this mean? For starters,... [Read More]
by RSS UnAttributed  |  Jan 08, 2014  |  Filed in: Industry Trends
October is National Cyber Security Awareness Month. As part of our ongoing support for NCSAM we have created a video for parents and children alike that can help everyone be a more educated internet user. See the video below about Internet Safety: [Read More]
by RSS Michael Perna  |  Oct 18, 2013  |  Filed in: Industry Trends
Last week Fortinet's vice president of Federal operations, Jeff Lake, participated in a webcast hosted by BreakingPoint Systems on cyber security and defense in depth. Other participants included Dennis Cox, BreakingPoint CTO, and Bruce Brody, managing partner and executive vice president of VISKO. As reported on the BreakingPoint blog, the team discussed the following points: Best practices for planning defense in depth The important role of training in securing your network How to break through the current "clique" of security professionals... [Read More]
by RSS Rick Popko  |  Sep 22, 2009  |  Filed in: Security Research
Remember that magical, silver bullet I spoke of when discussing the U.S. cyber security plan and the future of cyber security? Well, there still is no such item in existence yet; and there likely never will be one key solution. Securing cyberspace is a global problem that can not be addressed by one plan such as this. However, if this plan is properly implemented, enforced and refactored it should be able to lead by example. It is always said that the Internet has no borders, which is an inherit problem to tackling cyber crime. Remember, this is... [Read More]
by RSS Derek Manky  |  Jul 02, 2009  |  Filed in: Security Research
On May 29th, 2009, U.S. President Barack Obama held a conference at which he discussed a cyber security plan following an earlier 60 day review released in April. While there has been much debate and discussion on this initiative which is yet to take development with the announcement of a cyber "czar", I think one the more important aspects to recognize is that this is a step forward. Is it a step forward because this is the one answer, the silver bullet launched from the U.S. to stop cyber terrorism and information warfare in its tracks? Certainly... [Read More]
by RSS Derek Manky  |  Jun 04, 2009  |  Filed in: Security Research