This week we received news of another global ransomware attack that has reportedly affected FedEx, Rosneft, Moller-Maersk, and Merck. This comes hot on the heels of last month’s WannaCry ransomware attack that affected 300,000 computers in 150 countries. It seems these two attacks are linked because they both use the Server Message Block (SMB) protocol […]
On May 11th President Trump signed a Presidential Executive Order on Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure. In that Executive Order the President stated that, “Known but unmitigated vulnerabilities are among the highest cybersecurity risks faced by executive departments and agencies. Known vulnerabilities include using operating systems or hardware beyond the vendor’s […]
The Mirai Botnet Distributed Denial of Service (DDoS) attack of September and October 2016 gave a brief glimpse of the effect Internet of Things (IoT) devices can have on the greater Internet. This event was especially felt in Washington, D.C. where there seems to be an uptick in the amount of Government activism and IoT […]
Last week, while driving, an advertisement came on the radio for a home security system. I already have a home security system but the ad still caught my attention. As I listened I started to think about how much I pay each month to protect my physical possessions. Then I wondered why I am willing […]
What Ryan Lochte Can Teach Us About Selling Cybersecurity Tools
Do cybersecurity vendors consider user experience? We need to start designing solutions based on both network protection AND network performance.
The DoD CIO Terry Halvorsen made a bold call for the replacement of the CAC within the next two years. If there is no more CAC how can the DoD maintain its PKI?
I recently returned from the AFCEA Defensive Cyber Operations Symposium where one of the main topics was Assured Identity, particularly as it pertains to Mobility. The DoD’s Public Key Infrastructure (PKI) is well established as is the use of two-factor authentication via a Common Access Card (CAC). However, with the proliferation of mobile devices, CAC […]
What can Cam Newton teach us about embedded software cybersecurity? His answer to a reporter’s question following Carolina’s win over the Arizona Cardinals tells us everything we need to know.
TELEGRID is pleased to announce the release of its 10 Commandments of Embedded Software Security. This white paper describes ten best practices for integrating software security into embedded systems. These simple rules should be followed by any programmer creating embedded software and any program manager concerned about the security of their embedded software. To read […]