Cyber Threats In The Banking Industry

By |2019-01-17T16:20:52-04:00January 14th, 2019|Information Security|

Cybersecurity breaches continue to grow in both frequency and sophistication for all industries, and the financial sector is particularly vulnerable. In mid-2018, ITSP Magazine reported that financial services firms fall victim to cybersecurity attacks 300 times more frequently than businesses in other industries. Security breaches lead to lost revenue for a banking institutions, interruptions in [...]

The Surprising Role Of AI In Cybercrime

By |2019-01-17T16:21:32-04:00January 3rd, 2019|Information Security|

Artificial Intelligence (AI), or machine learning, is changing the technological landscape. As computers “learn” and make smarter “decisions”, response times become faster and efficiency and productivity increase. In the world of cybersecurity, AI is playing a more active role in efforts to discover cyber attacks. But, in the wrong hands, can this type of technology [...]

Software Supply Chain Threats Are On The Rise

By |2019-01-17T16:22:05-04:00December 27th, 2018|Information Security|

Large organizations in both the public and private sector routinely work with subcontractors for everything from the supply of manufactured components to the supply of custom computer code. For example, government agencies may contract with software development companies for the supply of code used in U.S. defense systems. In some cases, a software supplier may [...]

An Inside Look At The IPSec Tunnel

By |2019-01-17T16:27:16-04:00December 18th, 2018|Information Security|

The Internet is an integral part of daily business for most organizations today, and along with this comes an inherent vulnerability to cyber attacks. In the face of growing incidents of cybercrime, enterprises struggle with the quandary of how to keep data secure while avoiding disruptions to daily operations. For many businesses, the IPSec tunnel [...]

The Benefits And Practicalities Of Obfuscation

By |2019-01-17T16:32:11-04:00December 14th, 2018|Information Security|

Obfuscation is also known as geo-spoofing or anonymization, and it refers to the process of concealing a user’s geographic location. Keeping one’s whereabouts and identity concealed, especially when connecting from untrusted locations, can be challenging. To further complicate matters, in many locations around the world the only available Internet access may be from an unsecure [...]

Is The Supply Chain The New Cyber Abyss?

By |2019-01-17T16:33:15-04:00December 3rd, 2018|Information Security|

We all know that Target lost its CEO along with $164M dollars when a small HVAC contractor that was part of the supply chain was breached, allowing hackers into Target’s network. However, you may not be aware that banks spent over $200M reissuing Target credit cards. And, what about Chinese telecom equipment manufacturers ZTE and [...]

Data Privacy In 2019

By |2019-01-17T16:27:00-04:00November 28th, 2018|Information Security|

It’s been a big year for data privacy. The world’s strictest data protection standard to date, the European Union’s General Data Protection Regulation (GDPR), became enforceable in May 2018 and its reach stretches far beyond Europe’s borders. GDPR applies to any company that does business in Europe or serves European citizens, regardless of where it’s [...]

Protecting The Manufacturing Sector From Cybercrime

By |2018-11-14T17:28:27-04:00November 14th, 2018|Information Security|

Cyber attacks in the manufacturing sector are becoming more and more prevalent. The damage is often in the form of a data breach, disruption of operations or compromise to key systems such as the company’s enterprise resource planning system (ERP). According to a 2018 Data Breach Investigations Report by Verizon, more than 30% of data [...]

The Threat Of Cybercrime For State And Local Transportation Systems

By |2018-11-05T17:45:41-04:00November 5th, 2018|Information Security|

In two separate ransomware attacks earlier this year, cyber criminals disrupted operations at the Colorado Department of Transportation (CODOT) for several weeks. In this case, the damage was not as detrimental as it could have been but it still begs the question: are the defenses of our local and state transportation systems sufficiently protected to [...]

Cyber Risks And The Upcoming Midterm Elections

By |2018-10-25T15:42:57-04:00October 25th, 2018|Information Security|

The U.S. midterm elections are right around the corner and reports of Russian meddling during the last Presidential campaign is cause for concern. Could we have a repeat of Russian interference in the upcoming midterms? It turns out that it’s not just Russian hackers that could cause problems. As recently as late summer, three midterm [...]