Skip to content
  • UAS
  • Federal Aviation Administration (FAA)
  • Wireless Mesh Networks
  • Our Company
    • About Us
    • Our Founders
    • Blog
  • Contact Us
TELEGRID
TELEGRID
 
  • UAS
  • Federal Aviation Administration (FAA)
  • Wireless Mesh Networks
  • Our Company
    • About Us
    • Our Founders
    • Blog
  • Contact Us
Home Articles posted by Eric Sharret (Page 2)

Author: Eric Sharret

Mental Hypervisors and Hardware Cybersecurity
Uncategorized

Mental Hypervisors and Hardware Cybersecurity

By Eric Sharret April 17, 2017 February 5, 2018

Forbes Magazine had an interesting article last month about security vulnerabilities in home security products from SimpliSafe, Samsung, Comcast and others.  The author highlighted the usual vulnerabilities including default passwords and unencrypted signaling, but, there …

Read more"Mental Hypervisors and Hardware Cybersecurity"
Credential Stuffing – Just Like Grandma Used to Make
Uncategorized

Credential Stuffing – Just Like Grandma Used to Make

By Eric Sharret February 16, 2017 February 5, 2018

Every once in a while I read an interesting cybersecurity study that I feel deserves its own blog post.  It usually describes a successful cyber-attack that exist at the intersection of three things: organizational ambivalence, …

Read more"Credential Stuffing – Just Like Grandma Used to Make"
Government Activism and IoT
Cyber Security, Embedded Software

Government Activism and IoT

By Eric Sharret January 17, 2017 February 5, 2018  cybersecurity, embedded security, IoT

The Mirai Botnet Distributed Denial of Service (DDoS) attack of September and October 2016 gave a brief glimpse of the effect Internet of Things (IoT) devices can have on the greater Internet.  This event was …

Read more"Government Activism and IoT"
Should I protect my possessions or my identity?
Authentication, Cyber Security

Should I protect my possessions or my identity?

By Eric Sharret December 20, 2016 February 5, 2018  authentication, cybersecurity, identity and access management

Last week, while driving, an advertisement came on the radio for a home security system.  I already have a home security system but the ad still caught my attention.  As I listened I started to …

Read more"Should I protect my possessions or my identity?"
LinkedIn Phishing – Are your employees safe?
Authentication, Cyber Security

LinkedIn Phishing – Are your employees safe?

By Eric Sharret November 1, 2016 September 19, 2017

LinkedIn Phishing – Are your employees safe? It all started as a harmless exchange between like-minded adults.  It was something I had experienced many times before either at work or in the privacy of my …

Read more"LinkedIn Phishing – Are your employees safe?"
The Rise of the CISO and Cybersecurity Tool Development
Uncategorized

The Rise of the CISO and Cybersecurity Tool Development

By Eric Sharret October 14, 2016 October 14, 2016

PwC released its Global State of Information Security® Survey 2017 which is based on responses of 10,000 C-level executives from over 133 countries.  In the results PwC found that “59% of survey respondents say they …

Read more"The Rise of the CISO and Cybersecurity Tool Development"
Ryan Lochte and Cybersecurity Sales
Authentication, Cyber Security

Ryan Lochte and Cybersecurity Sales

By Eric Sharret September 15, 2016 February 5, 2018

What Ryan Lochte Can Teach Us About Selling Cybersecurity Tools

Read more"Ryan Lochte and Cybersecurity Sales"
Why is Cybersecurity So Slow?
Authentication, Cyber Security

Why is Cybersecurity So Slow?

By Eric Sharret August 19, 2016 February 5, 2018  cybersecurity, identity and access management, multi-factor authentication, network performance

Do cybersecurity vendors consider user experience? We need to start designing solutions based on both network protection AND network performance.

Read more"Why is Cybersecurity So Slow?"
Does the death of the CAC mean the death of PKI?
Authentication, Cyber Security

Does the death of the CAC mean the death of PKI?

By Eric Sharret July 18, 2016 February 5, 2018  authentication, common access card, cybersecurity, public key infrastructure

The DoD CIO Terry Halvorsen made a bold call for the replacement of the CAC within the next two years. If there is no more CAC how can the DoD maintain its PKI?

Read more"Does the death of the CAC mean the death of PKI?"
Is Your Password Worth $10?
Uncategorized

Is Your Password Worth $10?

By Eric Sharret June 10, 2016 August 10, 2020  authentication, identity and access management, multi-factor authentication, password management

Every day there are new headlines about stolen passwords. Multi-Factor Authentication is the only true prevention but how do we MFA-enable applications and devices that are not MFA-capable today.

Read more"Is Your Password Worth $10?"

Posts navigation

1 2 3 4

CONNECT WITH US!

Facebook
Twitter
YouTube
LinkedIn
Back to Top
Powered by Fluida & WordPress.