Implications of the DoD’s Cybersecurity Maturity Model Certification

By |2019-07-22T14:59:41-04:00July 22nd, 2019|Blog, Government, Information Security|

The US Department of Defense (DoD) has announced its intention to enact a new cybersecurity standard for defense contractors called the Cybersecurity Maturity Model Certification (CMMC). While the details of this certification are not yet finalized, the intent is to improve the current level of cybersecurity present in the US defense industrial base (DIB). [...]

The Dangers Of Foreign Made VPNs

By |2019-07-03T14:45:43-04:00February 15th, 2019|Government, Information Security|

On the heels of the recent Huawei scandal, lawmakers and cybersecurity experts alike are increasingly alarmed regarding the dangers of foreign virtual private networks (VPNs) . On February 7, 2019, Senators Marco Rubio and Ron Wyden penned a letter to the Department of Homeland Security requesting a potential ban on government-issued foreign made VPNs. VPNs serve [...]

Cyber Concerns For The Satellite Sector

By |2019-04-30T11:59:34-04:00January 18th, 2019|Enterprise, Government, Information Security, Supply Chain|

According to the Index of Objects Launched into Outer Space maintained by the United Nations Office for Outer Space Affairs (UNOOSA), as of mid-2018 there were 792 communications satellites orbiting the earth and several hundreds of others used for navigation, technology development, space science, earth science and earth observation. Satellite systems are critically important to [...]

The Surprising Role Of AI In Cybercrime

By |2019-04-30T12:00:18-04:00January 3rd, 2019|Enterprise, Government, Information Security|

Artificial Intelligence (AI), or machine learning, is changing the technological landscape. As computers “learn” and make smarter “decisions”, response times become faster and efficiency and productivity increase. In the world of cybersecurity, AI is playing a more active role in efforts to discover cyber attacks. But, in the wrong hands, can this type of technology [...]

The Benefits And Practicalities Of Obfuscation

By |2019-04-30T12:00:48-04:00December 14th, 2018|Enterprise, Government, Information Security, Military|

Obfuscation is also known as geo-spoofing or anonymization, and it refers to the process of concealing a user’s geographic location. Keeping one’s whereabouts and identity concealed, especially when connecting from untrusted locations, can be challenging. To further complicate matters, in many locations around the world the only available Internet access may be from an unsecure [...]

Is The Supply Chain The New Cyber Abyss?

By |2019-04-30T12:01:24-04:00December 3rd, 2018|Enterprise, Government, Information Security, Military, Supply Chain|

We all know that Target lost its CEO along with $164M dollars when a small HVAC contractor that was part of the supply chain was breached, allowing hackers into Target’s network. However, you may not be aware that banks spent over $200M reissuing Target credit cards. And, what about Chinese telecom equipment manufacturers ZTE and [...]

The Threat Of Cybercrime For State And Local Transportation Systems

By |2019-04-30T12:02:31-04:00November 5th, 2018|Government, Information Security, Supply Chain|

In two separate ransomware attacks earlier this year, cyber criminals disrupted operations at the Colorado Department of Transportation (CODOT) for several weeks. In this case, the damage was not as detrimental as it could have been but it still begs the question: are the defenses of our local and state transportation systems sufficiently protected to [...]

Cyber Risks And The Upcoming Midterm Elections

By |2019-04-30T12:02:44-04:00October 25th, 2018|Government, Information Security|

The U.S. midterm elections are right around the corner and reports of Russian meddling during the last Presidential campaign is cause for concern. Could we have a repeat of Russian interference in the upcoming midterms? It turns out that it’s not just Russian hackers that could cause problems. As recently as late summer, three midterm [...]

What Makes The GoSilent Product Suite Special

By |2019-04-30T12:07:22-04:00September 24th, 2018|Enterprise, Government, Information Security, Military, News|

Since we started Attila Security, a number of people have asked me to explain “What are you’re doing that is so special?”. I smile and enjoy telling them the story. IP-enabled devices are everywhere today, from laptops to video cameras to the industrial controls that manage the power grid, to computing devices and sensors. Our [...]

IoT Security Under Siege From Perpetrators and Regulation

By |2019-04-30T12:09:07-04:00September 19th, 2018|Enterprise, Government, Information Security|

The New York Times recently reported that a cyberattack on a shared data network forced four US natural gas pipeline operators to temporarily shut down computer communications with customers. Oneok, Energy Transfer Partners, Boardwalk Pipeline Partners and Eastern Shore Natural Gas (a Chesapeake Utilities subsidiary) all reported communications system interruptions earlier this spring. While there [...]