The Mirai Botnet Distributed Denial of Service (DDoS) attack of September and October 2016 gave a brief glimpse of the effect Internet of Things (IoT) devices can have on the greater Internet. This event was especially felt in Washington, D.C. where there seems to be an uptick in the amount of Government activism and IoT […]
Last week, while driving, an advertisement came on the radio for a home security system. I already have a home security system but the ad still caught my attention. As I listened I started to think about how much I pay each month to protect my physical possessions. Then I wondered why I am willing […]
LinkedIn Phishing – Are your employees safe? It all started as a harmless exchange between like-minded adults. It was something I had experienced many times before either at work or in the privacy of my own home. Normally I would not even have paid attention to it but it was what happened next that scared […]
PwC released its Global State of Information Security® Survey 2017 which is based on responses of 10,000 C-level executives from over 133 countries. In the results PwC found that “59% of survey respondents say they are boosting their spending on security as a result of digitization.” Hidden within the survey is the growing importance of […]
What Ryan Lochte Can Teach Us About Selling Cybersecurity Tools
Do cybersecurity vendors consider user experience? We need to start designing solutions based on both network protection AND network performance.
The DoD CIO Terry Halvorsen made a bold call for the replacement of the CAC within the next two years. If there is no more CAC how can the DoD maintain its PKI?
Every day there are new headlines about stolen passwords. Multi-Factor Authentication is the only true prevention but how do we MFA-enable applications and devices that are not MFA-capable today.
I recently returned from the AFCEA Defensive Cyber Operations Symposium where one of the main topics was Assured Identity, particularly as it pertains to Mobility. The DoD’s Public Key Infrastructure (PKI) is well established as is the use of two-factor authentication via a Common Access Card (CAC). However, with the proliferation of mobile devices, CAC […]
TELEGRID was pleased to host a Town Hall meeting by the Chairman of the House Appropriations Defense Subcommittee Rodney P. Frelinghuysen at TELEGRID’s Florham Park offices on April 6th.