3 Ways Blockchain Can Improve PKI When it comes to technology buzzwords there are few bigger than blockchain. Speak with any overexcited technologist and you will get an hour lecture about how it is the future of secure transactions. The benefits of blockchain technology are that it is public, distributed, and tamper-resistant. Indeed blockchain technology […]
Forbes Magazine had an interesting article last month about security vulnerabilities in home security products from SimpliSafe, Samsung, Comcast and others. The author highlighted the usual vulnerabilities including default passwords and unencrypted signaling, but, there was one quote that I found particularly interesting. When quoting the security expert Dr Andrew Zonenberg the author wrote “SimpliSafe […]
I recently attended a local chapter meeting of the Open Web Application Security Project (OWASP) where I saw something amazing. A white hat hacker was discussing methods to reverse hashing with common password dictionaries and as part of their demonstration they literally pulled a hashed password out of thin air. The tool that the white […]
Every once in a while I read an interesting cybersecurity study that I feel deserves its own blog post. It usually describes a successful cyber-attack that exist at the intersection of three things: organizational ambivalence, botnet technology and the human element. The reason why I find this type of attack so interesting is that it […]
LinkedIn Phishing – Are your employees safe? It all started as a harmless exchange between like-minded adults. It was something I had experienced many times before either at work or in the privacy of my own home. Normally I would not even have paid attention to it but it was what happened next that scared […]
PwC released its Global State of Information Security® Survey 2017 which is based on responses of 10,000 C-level executives from over 133 countries. In the results PwC found that “59% of survey respondents say they are boosting their spending on security as a result of digitization.” Hidden within the survey is the growing importance of […]
Every day there are new headlines about stolen passwords. Multi-Factor Authentication is the only true prevention but how do we MFA-enable applications and devices that are not MFA-capable today.
TELEGRID was pleased to host a Town Hall meeting by the Chairman of the House Appropriations Defense Subcommittee Rodney P. Frelinghuysen at TELEGRID’s Florham Park offices on April 6th.
Recent advancements in quantum computers have the potential to break modern cryptography.
Authentication is the next battleground of cyberwarfare but as opposed to encryption this one will include managing the Human Element.