Information Security

Is The Supply Chain The New Cyber Abyss?

By |2018-12-03T13:22:34+00:00December 3rd, 2018|Blog, Information Security|

We all know that Target lost its CEO along with $164M dollars when a small HVAC contractor that was part of the supply chain was breached, allowing hackers into Target’s network. However, you may not be aware that banks spent over $200M reissuing Target credit cards. And, what about Chinese telecom equipment manufacturers ZTE and [...]

Data Privacy In 2019

By |2018-11-28T16:44:52+00:00November 28th, 2018|Blog, Information Security|

It’s been a big year for data privacy. The world’s strictest data protection standard to date, the European Union’s General Data Protection Regulation (GDPR), became enforceable in May 2018 and its reach stretches far beyond Europe’s borders. GDPR applies to any company that does business in Europe or serves European citizens, regardless of where it’s [...]

Protecting The Manufacturing Sector From Cybercrime

By |2018-11-14T17:28:27+00:00November 14th, 2018|Information Security|

Cyber attacks in the manufacturing sector are becoming more and more prevalent. The damage is often in the form of a data breach, disruption of operations or compromise to key systems such as the company’s enterprise resource planning system (ERP). According to a 2018 Data Breach Investigations Report by Verizon, more than 30% of data [...]

The Threat Of Cybercrime For State And Local Transportation Systems

By |2018-11-05T17:45:41+00:00November 5th, 2018|Information Security|

In two separate ransomware attacks earlier this year, cyber criminals disrupted operations at the Colorado Department of Transportation (CODOT) for several weeks. In this case, the damage was not as detrimental as it could have been but it still begs the question: are the defenses of our local and state transportation systems sufficiently protected to [...]

Emerging Leader Attila Security Announces First Round of Funding

By |2018-10-31T12:27:42+00:00October 31st, 2018|Information Security, News|

Oversubscribed round led by DataTribe, Bull City Ventures and TEDCO's Seed Fund FULTON, MD. (PRWEB) OCTOBER 31, 2018 Attila Security, a company providing visibility, control and threat defense across physical, virtual, and cloud applications is pleased to announce it has completed its $2.5 m seed round of funding led by DataTribe, the country's leading startup-studio for cybersecurity [...]

Cyber Risks And The Upcoming Midterm Elections

By |2018-10-25T15:42:57+00:00October 25th, 2018|Information Security|

The U.S. midterm elections are right around the corner and reports of Russian meddling during the last Presidential campaign is cause for concern. Could we have a repeat of Russian interference in the upcoming midterms? It turns out that it’s not just Russian hackers that could cause problems. As recently as late summer, three midterm [...]

An Innocuous Printer-Fax Could Take Down Your Corporate Network

By |2018-10-05T19:04:30+00:00October 5th, 2018|Information Security|

That all-in-one printer/fax machine sitting in the corner looks innocent enough, but it actually poses a subversive threat. This standard office appliance could actually be the weak link that gives bad actors access to an organization’s entire network. As reported recently by Tom’s Guide, at the DEF CON 26 hacker conference, security researchers demonstrated how [...]

Cyber Risks In The Education Sector

By |2018-09-27T21:23:55+00:00September 27th, 2018|Information Security|

According to a January 2018 article in CSO Magazine, the education sector accounted for 13% of all data security breaches during the first half of 2017, resulting in the compromise of some 32 million personal records. These statistics represent a 164% increase in data security breaches compared to the previous year. Cybercrime in the education [...]

What Makes The GoSilent Product Suite Special

By |2018-09-24T14:19:22+00:00September 24th, 2018|Information Security, News|

Since we started Attila Security, a number of people have asked me to explain “What are you’re doing that is so special?”. I smile and enjoy telling them the story. IP-enabled devices are everywhere today, from laptops to video cameras to the industrial controls that manage the power grid, to computing devices and sensors. Our [...]

IoT Security Under Siege From Perpetrators and Regulation

By |2018-09-19T19:28:52+00:00September 19th, 2018|Information Security|

The New York Times recently reported that a cyberattack on a shared data network forced four US natural gas pipeline operators to temporarily shut down computer communications with customers. Oneok, Energy Transfer Partners, Boardwalk Pipeline Partners and Eastern Shore Natural Gas (a Chesapeake Utilities subsidiary) all reported communications system interruptions earlier this spring. While there [...]