The Dangers Of Foreign Made VPNs

By |2019-02-15T05:19:44-04:00February 15th, 2019|Information Security|

On the heels of the recent Huawei scandal, lawmakers and cybersecurity experts alike are increasingly alarmed regarding the dangers of foreign virtual private networks (VPNs) . On February 7, 2019, Senators Marco Rubio and Ron Wyden penned a letter to the Department of Homeland Security requesting a potential ban on government-issued foreign made VPNs. VPNs serve [...]

Cybersecurity Concerns For Foreign Nationals Working In The Middle East

By |2019-02-12T12:25:46-04:00February 12th, 2019|Information Security|

Cyber crime is now considered to be a pandemic, with a recent report estimating cyber crime to have cost the world 0.8% of global GDP or $600 billion in 2017. This cost will continue to grow, with experts predicting it will reach close to $6 trillion annually by 2021. These numbers underscore the necessity for robust [...]

What’s Your Cybersecurity Investment ROI?

By |2019-01-29T11:09:16-04:00January 29th, 2019|Information Security|

There is no doubt cybersecurity represents a significant financial investment for most enterprises. Protecting networks, identifying and monitoring all endpoints and continually defending against ever-evolving cyber attacks requires highly specialized personnel and/or technology. But failing to invest in cybersecurity is simply not an option anymore. New reports indicate the average cost of a cyber [...]

SMBs and Cyber Threats

By |2019-01-17T16:19:50-04:00January 22nd, 2019|Information Security|

For those who own or operate a small to medium size business, cybersecurity may not be a top priority. Many SMB leaders mistakenly believe cyber criminals focus strictly on large public and private sector organizations. However recent stats indicate SMBs should be increasingly wary of potential cyber attacks. Research shows more than 70 percent of [...]

Cyber Concerns For The Satellite Sector

By |2019-01-17T16:20:15-04:00January 18th, 2019|Information Security|

According to the Index of Objects Launched into Outer Space maintained by the United Nations Office for Outer Space Affairs (UNOOSA), as of mid-2018 there were 792 communications satellites orbiting the earth and several hundreds of others used for navigation, technology development, space science, earth science and earth observation. Satellite systems are critically important to [...]

Cyber Threats In The Banking Industry

By |2019-01-17T16:20:52-04:00January 14th, 2019|Information Security|

Cybersecurity breaches continue to grow in both frequency and sophistication for all industries, and the financial sector is particularly vulnerable. In mid-2018, ITSP Magazine reported that financial services firms fall victim to cybersecurity attacks 300 times more frequently than businesses in other industries. Security breaches lead to lost revenue for a banking institutions, interruptions in [...]

The Surprising Role Of AI In Cybercrime

By |2019-01-17T16:21:32-04:00January 3rd, 2019|Information Security|

Artificial Intelligence (AI), or machine learning, is changing the technological landscape. As computers “learn” and make smarter “decisions”, response times become faster and efficiency and productivity increase. In the world of cybersecurity, AI is playing a more active role in efforts to discover cyber attacks. But, in the wrong hands, can this type of technology [...]

Software Supply Chain Threats Are On The Rise

By |2019-01-17T16:22:05-04:00December 27th, 2018|Information Security|

Large organizations in both the public and private sector routinely work with subcontractors for everything from the supply of manufactured components to the supply of custom computer code. For example, government agencies may contract with software development companies for the supply of code used in U.S. defense systems. In some cases, a software supplier may [...]

An Inside Look At The IPSec Tunnel

By |2019-01-17T16:27:16-04:00December 18th, 2018|Information Security|

The Internet is an integral part of daily business for most organizations today, and along with this comes an inherent vulnerability to cyber attacks. In the face of growing incidents of cybercrime, enterprises struggle with the quandary of how to keep data secure while avoiding disruptions to daily operations. For many businesses, the IPSec tunnel [...]

The Benefits And Practicalities Of Obfuscation

By |2019-01-17T16:32:11-04:00December 14th, 2018|Information Security|

Obfuscation is also known as geo-spoofing or anonymization, and it refers to the process of concealing a user’s geographic location. Keeping one’s whereabouts and identity concealed, especially when connecting from untrusted locations, can be challenging. To further complicate matters, in many locations around the world the only available Internet access may be from an unsecure [...]