<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Cyber Security &#8211; TELEGRID</title>
	<atom:link href="https://telegrid.com/category/cyber-security/feed" rel="self" type="application/rss+xml" />
	<link>https://telegrid.com</link>
	<description></description>
	<lastBuildDate>Mon, 05 Feb 2018 22:00:31 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=5.6.13</generator>

<image>
	<url>https://telegrid.com/wp-content/uploads/2022/09/cropped-Screen-Shot-2022-08-29-at-9.50.37-AM-32x32.png</url>
	<title>Cyber Security &#8211; TELEGRID</title>
	<link>https://telegrid.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Hardware’s Burden: Meltdown and Spectre</title>
		<link>https://telegrid.com/meltdown-and-spectre?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=meltdown-and-spectre</link>
		
		<dc:creator><![CDATA[Eric Sharret]]></dc:creator>
		<pubDate>Tue, 16 Jan 2018 18:24:44 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Embedded Software]]></category>
		<guid isPermaLink="false">https://telegrid.com/?p=1381</guid>

					<description><![CDATA[<p>While at a recent industry event I heard a senior military leader note their preference for hardware-based security because “software is hackable”.  The idea of hardware as an uncrackable vault was rocked by this month’s &#8230;</p>
<p>The post <a rel="nofollow" href="https://telegrid.com/meltdown-and-spectre">Hardware’s Burden: Meltdown and Spectre</a> appeared first on <a rel="nofollow" href="https://telegrid.com">TELEGRID</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>While at a recent industry event I heard a senior military leader note their preference for hardware-based security because “software is hackable”.  The idea of hardware as an uncrackable vault was rocked by this month’s announcement of two major cybersecurity flaws in Intel chips, Meltdown and Spectre.  Meltdown and Spectre caused widespread panic and raised questions about the security of Intel chips and the last 20 years of processor design.  Jumping into action Intel was quick to release patches but the impact of these flaws will be felt for years to come.</p>
<p>While it is easy to say that Meltdown and Spectre prove that hardware is just as risky as software, I believe we should instead focus on how we got here.  I believe there is a lesson rooted in our approach to technological innovation as highlighted by Marc Andreessen’s seminal article <a href="https://a16z.com/2016/08/20/why-software-is-eating-the-world/">Why Software Is Eating the World</a>.</p>
<p>Software Defined Everything has become the rallying cry of organizations.  In a drive to reduce cost and speed up innovation we have started to treat hardware as a commodity and focus on software as the solution.  But there is a problem.  What if our hardware cannot keep up with our software?  Are we asking too much of our hardware?</p>
<p>Moore’s law states that processor speeds double every two years (or eighteen months according to Intel).  In technology two years is an eternity so engineers have devised ground breaking methods to speed up processors.   One such method, called speculative execution, allows a processor to perform a function before it knows whether the function is required.  If the function is not required then it is discarded but the act of completing it, just in case, allows the processor to perform operations more quickly.</p>
<h4 style="text-align: center;"><a class="fancybox" href="#contact_form_pop"><span style="color: #ff6600;">Click to Subscribe</span></a></h4>
<div class="fancybox-hidden" style="display: none;">
<div id="contact_form_pop" style="text-align: center;">[contact-form-7 id=&#8221;1478&#8243; title=&#8221;Subscribe&#8221;]</div>
</div>
<p>While designed as an optimization technique, Meltdown and Spectre proved that a cache timing attack <a href="https://youtu.be/q3WZiiaXHps">could take advantage of speculative execution</a> to expose secure kernel memory.  As described by <a href="https://www.theregister.co.uk/2018/01/02/intel_cpu_design_flaw/">The Register</a>, “To make the transition from user mode to kernel mode and back to user mode as fast and efficient as possible, the kernel is present in all processes&#8217; virtual memory address spaces, although it is invisible to these programs…It seems it may be possible to craft software in such a way that the processor starts executing an instruction that would normally be blocked – such as reading kernel memory from user mode – and completes that instruction before the privilege level check occurs.”</p>
<p><a href="https://youtu.be/q3WZiiaXHps">https://youtu.be/q3WZiiaXHps</a></p>
<p>Another example of the desire to use software to solve the limitations of hardware is the deployment of Virtual Machines (VMs).  VMs have truly changed the world, creating the cloud and allowing organizations to dramatically reduce cost.  VM technology allows collocated, software-based operating systems to share expensive hardware resources.  VM security is based on hardware Trusted Platform Module (TPM) storing secure information and software hypervisors scheduling access to hardware resources.</p>
<p>Despite these barriers, side channel attacks can still be used to cross the boundary between collocated VMs and steal private information.  These attacks involve an attacker VM alternating execution with a target VM to observe behavior of the underlying hardware.  They take advantage of the fact that, in order to conserve memory and speed up processing, VMs often share caches and libraries (i.e., memory page deduplication).  While difficult, multiple researchers have shown a side channel attack’s ability to retrieve secure information including <a href="https://eprint.iacr.org/2014/435.pdf">private keys</a>.  Other researchers have shown the ability to perform Denial of Service (DoS) attacks by using the VM <a href="http://www.ccs.neu.edu/home/pjd/papers/nca11-xen.pdf">scheduler</a> to monopolize hardware resources at the expense of collocated VMs.</p>
<p>With the advent of Software Defined Networking (SDN) will the next attack be listening to other people’s traffic on bare metal switches?</p>
<p>If we are asking too much of our hardware what can we do to correct it?  Should we accept slower processors, which has been the result of Intel’s patches?  Should we no longer allow collocation of VMs or demand completely separate data centers for our servers?</p>
<p>I am sure we will not start accepting slower speeds or higher costs so the next best option seems to be <a href="https://www.telegrid.com/10-commandments-embedded-software-security">education</a>.  Developers need to understand how hardware and software interoperates in order to prevent future cybersecurity attacks.  For instance, in addition to a six week course on Python, developers should also invest in a six week course on machine language.  Perhaps if they understood how hardware resources are actually used by software they will know when to push hardware and when not to.</p>
<p>&nbsp;</p>
<p>Eric Sharret is Vice President of Business Development at <a href="http://www.telegrid.com">TELEGRID</a>.  TELEGRID has unique expertise in secure embedded systems, secure authentication, PKI, and Multi-Factor Authentication (MFA).</p>
<p>&nbsp;</p>
<h4 style="text-align: center;"><a class="fancybox" href="#contact_form_pop"><span style="color: #ff6600;">Click to Subscribe</span></a></h4>
<div class="fancybox-hidden" style="display: none;">
<div id="contact_form_pop" style="text-align: center;">[contact-form-7 id=&#8221;1478&#8243; title=&#8221;Subscribe&#8221;]</div>
</div>
<p>Disclaimer: The opinions expressed here do not represent those of TELEGRID Technologies, Inc.  The Company will not be held liable for any errors, omissions, or delays in this information or any losses, injuries, or damages arising from its display or use.  All information is provided on an as-is basis.</p>
<p>The post <a rel="nofollow" href="https://telegrid.com/meltdown-and-spectre">Hardware’s Burden: Meltdown and Spectre</a> appeared first on <a rel="nofollow" href="https://telegrid.com">TELEGRID</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Authentication Token Cybersecurity and NIST 800-63-3</title>
		<link>https://telegrid.com/authentication-token-cybersecurity?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=authentication-token-cybersecurity</link>
		
		<dc:creator><![CDATA[Eric Sharret]]></dc:creator>
		<pubDate>Thu, 07 Dec 2017 15:29:02 +0000</pubDate>
				<category><![CDATA[Authentication]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[identity and access management]]></category>
		<category><![CDATA[mobile security]]></category>
		<guid isPermaLink="false">https://telegrid.com/?p=1355</guid>

					<description><![CDATA[<p>In June 2017, the National Institute of Standards and Technology (NIST) released its updated Digital Identity Guidelines in Special Publication 800-63-3.  The draft of this publication gained a lot of press in 2016 for highlighting &#8230;</p>
<p>The post <a rel="nofollow" href="https://telegrid.com/authentication-token-cybersecurity">Authentication Token Cybersecurity and NIST 800-63-3</a> appeared first on <a rel="nofollow" href="https://telegrid.com">TELEGRID</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="entry-content">
<div class="entry-content">
<p align="justify"><span style="font-family: Arial; font-size: medium;">In June 2017, the National Institute of Standards and Technology (NIST) released its updated Digital Identity Guidelines in Special Publication 800-63-3.  The draft of this publication gained a lot of press in 2016 for highlighting the cybersecurity risks when using SMS for multi-factor authentication.  While the final version has not had as much focus, the truth is the new guidelines will cause the government, the military and many commercial organizations to re-architect their Identity and Access Management (IdAM) infrastructures and rethink their authentication token distribution methods.</span></p>
<p>The reason is that NIST 800-63-3 goes farther than its predecessor by covering all aspects of IdAM from initial risk assessment to deployment of federated identity solutions.  Whereas NIST 800-63-2 focused almost exclusively on credential type (i.e., soft or hard token), NIST 800-63-3 includes Assurance Levels for Identity Proofing (how the user applied for the token), Authenticator Type (the form of the token) and Federated Architecture (how credentials are passed internally).</p>
<p align="justify">Federated Assurance Level (FAL) is by far the most important change since it will have the largest effect on internal networks.  The reason NIST is so focused on FAL is that they have seen an increase in cybersecurity attacks that take advantage of how authentication tokens are passed from an Identity Provider to a Service Provider.  These attacks include Man-in-the-Middle, Compromised Tokens, and Denial of Service and are not specific to any one standard (e.g., SAML, OAuth, Kerberos, etc.).</p>
<h4 style="text-align: center;"><a class="fancybox" href="#contact_form_pop"><span style="color: #ff6600;">Click to Subscribe</span></a></h4>
<div class="fancybox-hidden" style="display: none;">
<div id="contact_form_pop" style="text-align: center;">[contact-form-7 id=&#8221;1478&#8243; title=&#8221;Subscribe&#8221;]</div>
</div>
<p align="justify">To combat these cybersecurity attacks, the NIST guidelines now require that a user present a proof of key ownership in addition to an authentication token.  This was instituted for the most secure systems, those that are deemed FAL3, because relying solely on authentication tokens exposes the network.  The requirement to present a proof of key ownership is known as Holder of Key.</p>
<p align="justify">Holder of Key is not a new concept, however, the only standards based method to implement it is with PKI certificates and mutual TLS authentication.  This is an issue for organizations that either do not implement PKI or implement a Break and Inspect tool.  Break and Inspect refers to breaking a TLS connection between two parties in order to examine the secure contents of a message.  Break and Inspect is necessary because hackers typically hide their malicious activity within TLS traffic.  Once a TLS connection is broken, it is impossible to reestablish TLS with mutual authentication between the user and an application without also storing each user&#8217;s private key.  Storing every user&#8217;s private key is a HUGE cybersecurity risk.</p>
<p align="justify">Congress passed the Federal Information Security Modernization Act (FISMA) which created a requirement for federal agencies to manage information security based on publications that are developed by NIST.  In 2014 the DoD CIO, effectively joining federal agencies, issued Instruction 8510.01 replacing its own risk management process with NIST’s Risk Management Framework.  This made NIST’s Special Publication 800-63-3 a requirement of the Federal Government, the military, and most government contractors.  So, if you have not heard of NIST 800-63-3 and Holder of Key yet&#8230;you will soon.</p>
<p align="justify">If you currently implement Federated Identity or Single Sign-On (SSO) and are interested in getting more information on NIST 800-63-3 and Holder of Key, you should download TELEGRID’s <a href="https://telegrid.com/nist-800-63-3">white paper</a> on Authentication Token Cybersecurity and NIST 800-63-3 Holder of Key.  The <a href="https://telegrid.com/nist-800-63-3">white paper</a> provides information on specific authentication token cybersecurity attacks and how to seamlessly implement PKI even if you employ a Break and Inspect tool.  TELEGRID&#8217;s website also has helpful <a href="https://telegrid.com/identity-management-videos"> video tutorials</a> on NIST 800-63-3 to help organizations meet the new Digital Identity Guidelines.</p>
<p><span style="font-family: Arial; font-size: medium;"><br />
</span></p>
<p align="justify">Eric Sharret is Vice President of Business Development at <a href="http://www.telegrid.com">TELEGRID</a>.  TELEGRID has unique expertise in secure embedded systems, secure authentication, PKI, and Multi-Factor Authentication (MFA).</p>
<p><span style="font-family: Arial; font-size: medium;"><br />
</span></p>
<p align="justify">Disclaimer: The opinions expressed here do not represent those of TELEGRID Technologies, Inc.  TELEGRID Technologies, Inc. will not be liable for any errors, omissions, or delays in this information or any losses, injuries, or damages arising from its display or use.  All information is provided on an as-is basis.</p>
</div>
</div>
<p>The post <a rel="nofollow" href="https://telegrid.com/authentication-token-cybersecurity">Authentication Token Cybersecurity and NIST 800-63-3</a> appeared first on <a rel="nofollow" href="https://telegrid.com">TELEGRID</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Active Directory Cyber Attacks</title>
		<link>https://telegrid.com/active-directory-cyber-attacks?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=active-directory-cyber-attacks</link>
		
		<dc:creator><![CDATA[Eric Sharret]]></dc:creator>
		<pubDate>Wed, 30 Aug 2017 13:06:06 +0000</pubDate>
				<category><![CDATA[Authentication]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<guid isPermaLink="false">http://telegrid.com/?p=1132</guid>

					<description><![CDATA[<p>Active Directory has long been a favorite target for hackers.  As every penetration tester knows, the best way to compromise a network is to gain access to the Active Directory (AD) server and escalate your &#8230;</p>
<p>The post <a rel="nofollow" href="https://telegrid.com/active-directory-cyber-attacks">Active Directory Cyber Attacks</a> appeared first on <a rel="nofollow" href="https://telegrid.com">TELEGRID</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Active Directory has long been a favorite target for hackers.  As every penetration tester knows, the best way to compromise a network is to gain access to the Active Directory (AD) server and escalate your account privileges.  In the past few months though we have seen a shift towards more sophisticated Active Directory cyber attacks which take advantage of the nature of AD and other Authentication, Authorization and Accounting (AAA) servers.</p>
<p>AAA servers like AD and Radius servers are the central point for all access requests.  Anytime a user wishes to access an application, server, etc. their credentials are sent to a AAA server to determine whether they are legitimate (authentication) and are allowed access (authorization).  Depending on their configuration, the AAA server will also log access (accounting) although this is more commonly performed in commercial mobile networks.</p>
<p>Since the AAA server communicates with multiple applications and devices, across multiple security domains, it has become a prime target for botnet and denial of service (DoS) attacks.  Hackers and cybersecurity researchers have begun to take notice.  Let’s look at three examples.<br />
&nbsp;</p>
<h4 style="text-align: center;"><a class="fancybox" href="#contact_form_pop"><span style="color: #ff6600;">Click to Subscribe</span></a></h4>
<div class="fancybox-hidden" style="display: none;">
<div id="contact_form_pop" style="text-align: center;">[contact-form-7 id=&#8221;1478&#8243; title=&#8221;Subscribe&#8221;]</div>
</div>
<p>&nbsp;<br />
First, IBM X-Force Research <a href="https://securityintelligence.com/qakbot-banking-trojan-causes-massive-active-directory-lockouts/">recently</a> identified a banking trojan virus, Qakbot, that locked out thousands of AD users.  Qakbot is financial malware and is typically used to drain online bank accounts.  This was the first time researchers have seen it used as a DoS attack by preventing users from accessing applications and devices.</p>
<p>Second, researcher Guido Vranken used fuzzing, where malformed data is injected into a software application, to expose several vulnerabilities in FreeRadius, the most popular open source RADIUS server.  As <a href="http://www.securityweek.com/code-execution-dos-vulnerabilities-found-freeradius">Security Week</a> pointed out, “The list of vulnerabilities includes memory leak, out-of-bounds read, memory exhaustion, buffer overflow and other issues that can be exploited to remotely execute arbitrary code or cause a DoS condition.”  Luckily the open source community was quick to address the vulnerabilities.</p>
<p>Third, at this year’s Black Hat conference, Threat Intelligence engineers gave a <a href="https://www.scmagazine.com/active-directory-botnet-sets-up-cc-infrastructure-inside-infected-networks-while-bypassing-defenses/article/677864/">talk</a> about a method to turn the AD Domain Controller into a botnet’s command and control server.  As they pointed out, the AAA architecture, where disparate computers take access instructions from a central controller, closely mimics that of a botnet.  If malware were installed it could take advantage of existing AD commands and user attributes to transfer information between infected clients and out of the network.  If there was only one AD domain controller for the entire network, this would allow data transfer between security domains.</p>
<p>For the moment many of these attacks can be prevented by patching, monitoring and constructing proper network architectures.  However, as the hacker community continues to turn its attention to AAA it is only a matter of time before widespread zero day Active Directory cyber attacks are unleashed.</p>
<p>&nbsp;</p>
<p>Eric Sharret is Vice President of Business Development at <a href="http://www.telegrid.com">TELEGRID</a>.  TELEGRID has unique expertise in secure embedded systems, secure authentication, PKI, and Multi-Factor Authentication (MFA).</p>
<p>&nbsp;</p>
<h4 style="text-align: center;"><a class="fancybox" href="#contact_form_pop"><span style="color: #ff6600;">Click to Subscribe</span></a></h4>
<div class="fancybox-hidden" style="display: none;">
<div id="contact_form_pop" style="text-align: center;">[contact-form-7 id=&#8221;1478&#8243; title=&#8221;Subscribe&#8221;]</div>
</div>
<p>Disclaimer: The opinions expressed here do not represent those of TELEGRID Technologies, Inc.  The Company will not be held liable for any errors, omissions, or delays in this information or any losses, injuries, or damages arising from its display or use.  All information is provided on an as-is basis.</p>
<p>The post <a rel="nofollow" href="https://telegrid.com/active-directory-cyber-attacks">Active Directory Cyber Attacks</a> appeared first on <a rel="nofollow" href="https://telegrid.com">TELEGRID</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Ransomware and 3 Rays of Hope</title>
		<link>https://telegrid.com/ransomware-3-rays-hope?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=ransomware-3-rays-hope</link>
		
		<dc:creator><![CDATA[Eric Sharret]]></dc:creator>
		<pubDate>Thu, 29 Jun 2017 14:57:07 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<guid isPermaLink="false">http://telegrid.com/?p=1107</guid>

					<description><![CDATA[<p>This week we received news of another global ransomware attack that has reportedly affected FedEx, Rosneft, Moller-Maersk, and Merck.  This comes hot on the heels of last month’s WannaCry ransomware attack that affected 300,000 computers &#8230;</p>
<p>The post <a rel="nofollow" href="https://telegrid.com/ransomware-3-rays-hope">Ransomware and 3 Rays of Hope</a> appeared first on <a rel="nofollow" href="https://telegrid.com">TELEGRID</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>This week we received news of another global ransomware attack that has reportedly affected FedEx, Rosneft, Moller-Maersk, and Merck.  This comes hot on the heels of last month’s WannaCry ransomware attack that affected 300,000 computers in 150 countries.  It seems these two attacks are linked because they both use the Server Message Block (SMB) protocol to rapidly infect machines on a Windows network.  This is the EternalBlue exploit that was reportedly stolen from the National Security Agency (NSA).</p>
<p>It seems the scale and timing of the ransomware attacks should be a major cause for concern.  However, I believe that the nature in which these attacks are being dealt with highlights 3 rays of hope that we are turning a corner in cybersecurity.</p>
<p>The first ray of hope is the amount of money being raised from these ransomware attacks.  As mentioned, WannaCry affected 300,000 computers with each user being asked for $300 to unlock their data files.  That should equate to $90,000,000.  <a href="http://www.cnbc.com/2017/05/15/wannacry-ransomware-hackers-have-only-made-50000-worth-of-bitcoin.html">It is estimated</a>, however, that only $50,000 was collected.  This means that the vast majority of users figured out another way to deal with the crisis.  Perhaps users backed up their data or, in the case of <a href="https://www.bloomberg.com/news/articles/2017-06-27/ukraine-russia-report-ransomware-computer-virus-attacks">Rosneft</a>, switched to an entire backup system.  With virtual machines and cloud computing, administrators can simply tear down infected systems and rebuild them to a previous image.  The way organizations are dealing with ransomware is a clear sign of better planning.</p>
<h4 style="text-align: center;"><a class="fancybox" href="#contact_form_pop"><span style="color: #ff6600;">Click to Subscribe</span></a></h4>
<div class="fancybox-hidden" style="display: none;">
<div id="contact_form_pop" style="text-align: center;">[contact-form-7 id=&#8221;1478&#8243; title=&#8221;Subscribe&#8221;]</div>
</div>
<p>The second ray of hope is how the attacks are being thwarted.  WannaCry was undone by a 22 year old white hat hacker who recognized a simple kill switch.  In short, ransomware is designed to recognize traps by sending a request to a fake website.  This test is designed to fail and lets the ransomware know that it is on a real machine and not trapped in a simulated sandbox.  To stop WannaCry this 22 year old simply bought the fake domain and set up a real website.  When the ransomware stopped getting a failed signal it shut itself off.  While interesting, the fact that the ransomware was undone by a simple fix is not the ray of hope.  The ray of hope is that WannaCry was undone by an anonymous 22 year old researcher, not a major cybersecurity company.  We should be happy that there is an army of white hat hackers out there working to keep the internet safe.</p>
<p>The third ray of hope is the scale of the attack.  While it is estimated that WannaCry infected 300,000 computers, this new variant has so far only affected 2,000.  The SMB protocol exploit, on which both attacks rely, can be resolved by a simple Windows patch.  The reason WannaCry was so widespread is that administrators did not update their systems.  Perhaps the reduced scale of this new attack points to the fact that administrators are becoming more careful with security patches.</p>
<p>While we can take comfort from these 3 rays of hope, we are not out of the woods yet.  Cybersecurity is a game of cat and mouse and this week’s ransomware attack will not be the last.  However, organizations spent over <a href="http://www.informationweek.com/strategic-cio/security-and-risk-strategy/global-it-security-spending-will-top-$81-billion-in-2016/d/d-id/1326547">$80 billion</a> on cybersecurity in 2016 and the rapid nature in which ransomware is being dealt with proves that this was money well spent.</p>
<p>&nbsp;</p>
<p>Eric Sharret is Vice President of Business Development at <a href="http://www.telegrid.com">TELEGRID</a>.  TELEGRID has unique expertise in secure embedded systems, secure authentication, PKI, and Multi-Factor Authentication (MFA).</p>
<h4 style="text-align: center;"><a class="fancybox" href="#contact_form_pop"><span style="color: #ff6600;">Click to Subscribe</span></a></h4>
<div class="fancybox-hidden" style="display: none;">
<div id="contact_form_pop" style="text-align: center;">[contact-form-7 id=&#8221;1478&#8243; title=&#8221;Subscribe&#8221;]</div>
</div>
<p><span style="font-family: Arial; font-size: medium;">Disclaimer: The opinions expressed here do not represent those of TELEGRID Technologies, Inc.  TELEGRID Technologies, Inc. will not be liable for any errors, omissions, or delays in this information or any losses, injuries, or damages arising from its display or use.  All information is provided on an as-is basis.</span></p>
<p>The post <a rel="nofollow" href="https://telegrid.com/ransomware-3-rays-hope">Ransomware and 3 Rays of Hope</a> appeared first on <a rel="nofollow" href="https://telegrid.com">TELEGRID</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Does President Trump Want an Offline LINUX Repository?</title>
		<link>https://telegrid.com/offline-linux-repository?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=offline-linux-repository</link>
		
		<dc:creator><![CDATA[Beth Flippo]]></dc:creator>
		<pubDate>Mon, 15 May 2017 12:11:37 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Embedded Software]]></category>
		<category><![CDATA[Programming]]></category>
		<category><![CDATA[embedded security]]></category>
		<category><![CDATA[LINUX repository]]></category>
		<guid isPermaLink="false">http://telegrid.com/?p=1096</guid>

					<description><![CDATA[<p>On May 11th President Trump signed a Presidential Executive Order on Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure.  In that Executive Order the President stated that, “Known but unmitigated vulnerabilities are among the &#8230;</p>
<p>The post <a rel="nofollow" href="https://telegrid.com/offline-linux-repository">Does President Trump Want an Offline LINUX Repository?</a> appeared first on <a rel="nofollow" href="https://telegrid.com">TELEGRID</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>On May 11<sup>th</sup> President Trump signed a <a href="https://www.whitehouse.gov/the-press-office/2017/05/11/presidential-executive-order-strengthening-cybersecurity-federal">Presidential Executive Order on Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure</a>.  In that Executive Order the President stated that, “Known but unmitigated vulnerabilities are among the highest cybersecurity risks faced by executive departments and agencies.  Known vulnerabilities include using operating systems or hardware beyond the vendor&#8217;s support lifecycle, <strong>declining to implement a vendor&#8217;s security patch, or failing to execute security-specific configuration guidance</strong>.”  It seems the President agrees with something <a href="http://www.telegrid.com">TELEGRID</a> has been recommending for years, an offline LINUX repository for secure networks.</p>
<p>As an embedded software developer I can go on and on about the many benefits of LINUX.  I can easily list hundreds of benefits.  What I believe is the greatest though is the LINUX repository.</p>
<p>The LINUX repository is an online archive of open source and proprietary software packages that programmers use for development or maintenance.  There is a repository for every LINUX distribution with compiled packages for a multitude of hardware configurations.  Software developers can create upgrades or security patches and upload them to the LINUX repository where they can be easily downloaded by users.</p>
<h4 style="text-align: center;"><a class="fancybox" href="#contact_form_pop"><span style="color: #ff6600;">Click to Subscribe</span></a></h4>
<div class="fancybox-hidden" style="display: none;">
<div id="contact_form_pop" style="text-align: center;">[contact-form-7 id=&#8221;1478&#8243; title=&#8221;Subscribe&#8221;]</div>
</div>
<p>Unfortunately, new security risks are forcing system administrators to limit connectivity between secure networks and the internet.   You can’t be hacked if a hacker can’t get in. While a closed network is ideal for security, it is a big problem for software maintenance.</p>
<p>Since the LINUX repository is online, the software upgrades are inaccessible on a secure network.  For years defense contractors, like <a href="http://www.telegrid.com">TELEGRID</a>, have had to go to great lengths to deploy software upgrades on secure networks.  This leads to delays in the deployment of security patches and seemingly endless upgrade cycles.</p>
<p>To resolve these issues we recommend replicating the LINUX repository inside secure networks with an offline LINUX repository.  But how do we update the LINUX repository if it is offline? One solution is to deploy a cross domain solution that straddles the secure and unsecure networks.  Another solution is compressing repository updates and sending them to a system administrator who can upload them into the offline LINUX repository.</p>
<p>While secure networks are important we must not forget that the main goal is functional, bug-free and secure code.  An offline LINUX repository will make it easier to maintain code on secure networks and apply needed security patches.  It seems the President agrees.</p>
<p>&nbsp;</p>
<p>Beth Flippo is Vice President of Embedded Software at <a href="http://www.telegrid.com">TELEGRID</a>.  TELEGRID has unique expertise in secure embedded systems, secure authentication, PKI, and Multi-Factor Authentication (MFA).</p>
<p>&nbsp;</p>
<h4 style="text-align: center;"><a class="fancybox" href="#contact_form_pop"><span style="color: #ff6600;">Click to Subscribe</span></a></h4>
<div class="fancybox-hidden" style="display: none;">
<div id="contact_form_pop" style="text-align: center;">[contact-form-7 id=&#8221;1478&#8243; title=&#8221;Subscribe&#8221;]</div>
</div>
<p>Disclaimer: The opinions expressed here do not represent those of TELEGRID Technologies, Inc.  The Company will not be held liable for any errors, omissions, or delays in this information or any losses, injuries, or damages arising from its display or use.  All information is provided on an as-is basis.</p>
<p>The post <a rel="nofollow" href="https://telegrid.com/offline-linux-repository">Does President Trump Want an Offline LINUX Repository?</a> appeared first on <a rel="nofollow" href="https://telegrid.com">TELEGRID</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Government Activism and IoT</title>
		<link>https://telegrid.com/government-activism-and-iot?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=government-activism-and-iot</link>
		
		<dc:creator><![CDATA[Eric Sharret]]></dc:creator>
		<pubDate>Tue, 17 Jan 2017 16:23:05 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Embedded Software]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[embedded security]]></category>
		<category><![CDATA[IoT]]></category>
		<guid isPermaLink="false">http://telegrid.com/?p=985</guid>

					<description><![CDATA[<p>The Mirai Botnet Distributed Denial of Service (DDoS) attack of September and October 2016 gave a brief glimpse of the effect Internet of Things (IoT) devices can have on the greater Internet.  This event was &#8230;</p>
<p>The post <a rel="nofollow" href="https://telegrid.com/government-activism-and-iot">Government Activism and IoT</a> appeared first on <a rel="nofollow" href="https://telegrid.com">TELEGRID</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>The Mirai Botnet Distributed Denial of Service (DDoS) attack of September and October 2016 gave a brief glimpse of the effect Internet of Things (IoT) devices can have on the greater Internet.  This event was especially felt in Washington, D.C. where there seems to be an uptick in the amount of Government activism and IoT and the frequency and scale of intervention with IoT device manufacturers.  The following are just a few examples:</p>
<ul>
<li>On December 30, 2016 the Congressional Internet of Things Working Group released a <a href="http://latta.house.gov/uploadedfiles/iot_working_group_white_paper.pdf">white paper</a> on IoT stating that, “Recent examples of cyberattacks on IoT devices have exposed not just the potential impact on individual consumers, but the possible vulnerability on the broader Internet infrastructure.”</li>
</ul>
<ul>
<li>On January 5, 2017 the Federal Trade Commission issued a <a href="https://www.ftc.gov/system/files/documents/cases/170105_d-link_complaint_and_exhibits.pdf">complaint</a> against D-Link claiming that D-Link’s “routers and cameras have been vulnerable to attacks that subject consumers’ sensitive personal information and local networks to a significant risk of unauthorized access.”</li>
</ul>
<ul>
<li>On January 9, 2017 the Federal Drug Administration released a <a href="http://www.fda.gov/MedicalDevices/Safety/AlertsandNotices/ucm535843.htm">note</a> about St. Jude Medical stating that its devices had vulnerabilities that, “if exploited, could allow an unauthorized user, i.e., someone other than the patient&#8217;s physician, to remotely access a patient&#8217;s RF-enabled implanted cardiac device.”</li>
</ul>
<ul>
<li>On January 12, 2017 the Department of Commerce released a <a href="https://www.ntia.doc.gov/files/ntia/publications/iot_green_paper_01122017.pdf">Green Paper</a> highlighting the security concerns around IoT. It states that the DDoS attack, “was the most visible and far-reaching example of the potential risks that must be mitigated when considering IoT.”</li>
</ul>
<p>It appears that this the beginning of an activist approach taken by the Government to monitor IoT device manufacturers.  Indeed, the Congressional Internet of Things Working Group white paper states that participants, “grappled with whether or not a solution should rely on industry established standards, agency recommendations, legislation, or a combination of all the above.”</p>
<h4 style="text-align: center;"><a class="fancybox" href="#contact_form_pop"><span style="color: #ff6600;">Click to Subscribe</span></a></h4>
<div class="fancybox-hidden" style="display: none;">
<div id="contact_form_pop" style="text-align: center;">[contact-form-7 id=&#8221;1478&#8243; title=&#8221;Subscribe&#8221;]</div>
</div>
<p>TELEGRID is a designer of <a href="http://telegrid.com/embedded-software-security/">secure embedded systems</a> for the US Military and has developed a <a href="http://telegrid.com/embedded-software-security/">framework</a> to design systems in line with DISA’s Security Technical Implementation Guides (DISA STIGs).  While some commercial manufacturers follow NIST guidelines others ignore security completely.  As Senator Mark Warner, co-founder of the Senate Cybersecurity Caucus <a href="http://www.warner.senate.gov/public/index.cfm/pressreleases?ContentRecord_id=CD1BBB25-83E0-494D-B7E1-1C350A7CFCCA">stated</a>, “Manufacturers today are flooding the market with cheap, insecure devices, with few market incentives to design the products with security in mind, or to provide ongoing support.”</p>
<p>Is the Government going to “incentivize” commercial manufacturers to bake in security?  Will the Government shut certain companies out of the market for selling unsecure IoT devices?  What will be the cost impact to consumers?</p>
<p>These are all very tough questions and it seems the Government is moving quickly to try to answer them.  Are IoT manufacturers paying attention?</p>
<p>&nbsp;</p>
<p>Eric Sharret is Vice President of Business Development at <a href="http://www.telegrid.com/">TELEGRID</a>.  TELEGRID has unique expertise in secure embedded systems, secure authentication, PKI, Multi-Factor Authentication (MFA).</p>
<p>&nbsp;</p>
<h4 style="text-align: center;"><a class="fancybox" href="#contact_form_pop"><span style="color: #ff6600;">Click to Subscribe</span></a></h4>
<div class="fancybox-hidden" style="display: none;">
<div id="contact_form_pop" style="text-align: center;">[contact-form-7 id=&#8221;1478&#8243; title=&#8221;Subscribe&#8221;]</div>
</div>
<p>Disclaimer: The opinions expressed here do not represent those of TELEGRID Technologies, Inc.  The Company will not be held liable for any errors, omissions, or delays in this information or any losses, injuries, or damages arising from its display or use.  All information is provided on an as-is basis.</p>
<p>The post <a rel="nofollow" href="https://telegrid.com/government-activism-and-iot">Government Activism and IoT</a> appeared first on <a rel="nofollow" href="https://telegrid.com">TELEGRID</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Should I protect my possessions or my identity?</title>
		<link>https://telegrid.com/protect-my-possessions-or-my-identity?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=protect-my-possessions-or-my-identity</link>
		
		<dc:creator><![CDATA[Eric Sharret]]></dc:creator>
		<pubDate>Tue, 20 Dec 2016 22:09:10 +0000</pubDate>
				<category><![CDATA[Authentication]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[authentication]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[identity and access management]]></category>
		<guid isPermaLink="false">http://telegrid.com/?p=969</guid>

					<description><![CDATA[<p>Last week, while driving, an advertisement came on the radio for a home security system.  I already have a home security system but the ad still caught my attention.  As I listened I started to &#8230;</p>
<p>The post <a rel="nofollow" href="https://telegrid.com/protect-my-possessions-or-my-identity">Should I protect my possessions or my identity?</a> appeared first on <a rel="nofollow" href="https://telegrid.com">TELEGRID</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Last week, while driving, an advertisement came on the radio for a home security system.  I already have a home security system but the ad still caught my attention.  As I listened I started to think about how much I pay each month to protect my physical possessions.  Then I wondered why I am willing to pay so much to protect a $500 TV but nothing to protect my digital identity.  This begged the question, if I had to choose, should I protect my possessions or my identity?</p>
<p>I believe that in order to answer this question properly we must make three comparisons:</p>
<ol>
<li>The average loss for a home burglary versus the average loss for an identity theft</li>
<li>The probability of a home burglary versus the probability of an identity theft</li>
<li>The cost of a home security system versus the cost of identity theft protection</li>
</ol>
<p>In its report on <a href="https://ucr.fbi.gov/crime-in-the-u.s/2014/crime-in-the-u.s.-2014/offenses-known-to-law-enforcement/burglary">Crime in the United States</a>, the FBI found that in 2014 the average dollar loss per burglary offense was $2,251.  This is higher than the average dollar loss for identity theft over the same time frame which was $1,343 according to the <a href="http://www.bjs.gov/content/pub/pdf/vit14.pdf">Department of Justice</a>.</p>
<h4 style="text-align: center;"><a class="fancybox" href="#contact_form_pop"><span style="color: #ff6600;">Click to Subscribe</span></a></h4>
<div class="fancybox-hidden" style="display: none;">
<div id="contact_form_pop" style="text-align: center;">[contact-form-7 id=&#8221;1478&#8243; title=&#8221;Subscribe&#8221;]</div>
</div>
<p>However, when considering the number of occurrences, identity theft is far more likely than a burglary.  The DoJ reported 17.6 million cases of identity theft, or 7% of all US residents above the age of 16, in 2014.  This was 10 times more than the 1.7 million burglaries that were reported over the same time period by the FBI.</p>
<p>In terms of cost it is difficult to gauge exact figures based on the multitude of offerings for both home security systems and identity theft protection.  However, it seems that identity theft protection is the same or less per month than a home security system.</p>
<p>I understand that a home security system also provides the intangible value of personal protection and that there is no value that you can put on peace of mind.  However, I could counter that the majority of burglaries happen between the hours of 10AM and 3PM, when the homeowner is not home, and therefore personal protection has no inherent value.</p>
<p>So, should I protect my possessions or my identity? Based on this very simple statistical comparison it seems that, if I had to choose, I should protect my digital identity before I protect my physical possessions.  What would you pay to protect?</p>
<p>&nbsp;</p>
<p>Eric Sharret is Vice President of Business Development at <a href="http://www.telegrid.com">TELEGRID</a>.  TELEGRID has unique expertise in secure authentication, PKI and Multi-Factor Authentication (MFA).</p>
<h4 style="text-align: center;"><a class="fancybox" href="#contact_form_pop"><span style="color: #ff6600;">Click to Subscribe</span></a></h4>
<div class="fancybox-hidden" style="display: none;">
<div id="contact_form_pop" style="text-align: center;">[contact-form-7 id=&#8221;1478&#8243; title=&#8221;Subscribe&#8221;]</div>
</div>
<p>Disclaimer: The opinions expressed here do not represent those of TELEGRID Technologies, Inc.  The Company will not be held liable for any errors, omissions, or delays in this information or any losses, injuries, or damages arising from its display or use.  All information is provided on an as-is basis.</p>
<p>The post <a rel="nofollow" href="https://telegrid.com/protect-my-possessions-or-my-identity">Should I protect my possessions or my identity?</a> appeared first on <a rel="nofollow" href="https://telegrid.com">TELEGRID</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>LinkedIn Phishing &#8211; Are your employees safe?</title>
		<link>https://telegrid.com/linkedin-phishing?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=linkedin-phishing</link>
		
		<dc:creator><![CDATA[Eric Sharret]]></dc:creator>
		<pubDate>Tue, 01 Nov 2016 15:21:57 +0000</pubDate>
				<category><![CDATA[Authentication]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<guid isPermaLink="false">http://telegrid.com/?p=866</guid>

					<description><![CDATA[<p>LinkedIn Phishing &#8211; Are your employees safe? It all started as a harmless exchange between like-minded adults.  It was something I had experienced many times before either at work or in the privacy of my &#8230;</p>
<p>The post <a rel="nofollow" href="https://telegrid.com/linkedin-phishing">LinkedIn Phishing &#8211; Are your employees safe?</a> appeared first on <a rel="nofollow" href="https://telegrid.com">TELEGRID</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h4 style="text-align: center;"><span style="color: #ff6600;">LinkedIn Phishing &#8211; Are your employees safe?</span></h4>
<p>It all started as a harmless exchange between like-minded adults.  It was something I had experienced many times before either at work or in the privacy of my own home.  Normally I would not even have paid attention to it but it was what happened next that scared me.</p>
<p>I was at my desk when an email arrived with the familiar title, “Eric, please add me to your LinkedIn network”.  I normally ignore LinkedIn requests from people I don’t know but this one was different.  Alex was an executive at an oil &amp; gas company.  He had a complete profile and a picture of him riding a bicycle.  I do not know how he found me but I assumed he had read one of my amazing <a href="http://telegrid.com/cybersecurity-blog/">blog posts</a> ;).  Since he was in the oil &amp; gas industry and my company sells cybersecurity and wireless mesh networking tools to utilities I decided to click Accept.</p>
<p>The next night Alex sent me a message thanking me for accepting his request and telling me about an amazing opportunity to sell his company’s jet fuel.  Turns out he needed help in the US and the job would pay extremely well for only 5 hours of work per week.  Within the message was a link to a job offer and another link to an overview of his company.  Now “this ain’t my first rodeo” so I reported the message as LinkedIn Phishing and blocked Alex.  (On second thought I should have had the white hat hackers in my company reply with a link to lock his computer.)</p>
<p>The exchange left me wondering, are companies doing enough to protect against LinkedIn Phishing?</p>
<p>Companies train their employees to ignore phishing emails and deploy sandboxes to protect networks.  Companies also put in protections against Facebook Phishing, normally by blocking access since Facebook is not considered a work application.  However, LinkedIn is not email and it is not Facebook, it is a great tool that professionals use to expand their networks.  For this reason companies do not have LinkedIn Phishing protections but rather encourage their employees to connect with as many people as possible.</p>
<p>So what can companies do?</p>
<p>Since this came over the LinkedIn messaging system it is unlikely that it would have been caught by a spam filter, and, even if it was, an employee could still access the message from the LinkedIn website. This means that in order to prevent LinkedIn Phishing a company would have to block all of LinkedIn.  Additionally, this was not a bulk email phishing attempt that could be tracked, but rather a concerted spear phishing effort by someone who connected one day and then came back the next day to phish.  LinkedIn could solve this problem, and I am sure they are working on it, but until then the only solution seems to be employee training.</p>
<p>Or, I could be completely wrong, Alex is real, and I just missed the opportunity to get into the fast growing jet fuel market.</p>
<p>&nbsp;</p>
<p>Eric Sharret is Vice President of Business Development at <a href="http://www.telegrid.com">TELEGRID</a>.  TELEGRID has unique expertise in secure authentication, PKI and Multi-Factor Authentication (MFA).</p>
<p>Disclaimer: The opinions expressed here do not represent those of TELEGRID Technologies, Inc.  The Company will not be held liable for any errors, omissions, or delays in this information or any losses, injuries, or damages arising from its display or use.  All information is provided on an as-is basis.</p>
<p>The post <a rel="nofollow" href="https://telegrid.com/linkedin-phishing">LinkedIn Phishing &#8211; Are your employees safe?</a> appeared first on <a rel="nofollow" href="https://telegrid.com">TELEGRID</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Ryan Lochte and Cybersecurity Sales</title>
		<link>https://telegrid.com/ryan-lochte-cybersecurity-sales?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=ryan-lochte-cybersecurity-sales</link>
		
		<dc:creator><![CDATA[Eric Sharret]]></dc:creator>
		<pubDate>Thu, 15 Sep 2016 17:49:39 +0000</pubDate>
				<category><![CDATA[Authentication]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<guid isPermaLink="false">http://telegrid.com/?p=607</guid>

					<description><![CDATA[<p>What Ryan Lochte Can Teach Us About Selling Cybersecurity Tools</p>
<p>The post <a rel="nofollow" href="https://telegrid.com/ryan-lochte-cybersecurity-sales">Ryan Lochte and Cybersecurity Sales</a> appeared first on <a rel="nofollow" href="https://telegrid.com">TELEGRID</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p style="text-align: left;">By now we all know the story of Ryan Lochte and his &#8220;over exaggeration&#8221;. Never one to miss an opportunity to relate current events to cybersecurity I thought I would write about the cybersecurity sales lessons that we can learn from this unfortunate event.</p>
<p style="text-align: left;"><strong>Stop &#8220;Over Exaggerating&#8221; to Scare Your Customers</strong></p>
<p>In most organizations cybersecurity sales&#8217; rule #1 is to scare potential customers. Salespeople &#8220;over exaggerate&#8221; by telling customers the barbarian hordes are at their gates and if the customer does not buy the solution today then they will lose hundreds of millions of dollars. Then salespeople back up their claims with impressive statistics like 110% of people were compromised by the exact problem that our solution resolves. As Homer Simpson once said &#8220;you can come up with statistics to prove anything. Forty percent of all people know that&#8221;.</p>
<p>The truth is that your customer knows the statistics and they understand the risks. Don&#8217;t sell to customers by fear mongering but rather by inspiring. Just last week a customer referred to TELEGRID&#8217;s <a href="http://telegrid.com/privileged-access-management/"> Privileged Access Management</a> tool as &#8220;elegant&#8221;. That is what you want to hear.</p>
<p>Show your customer how easy your solution is to install, how it will make their day-to-day job easier and most importantly how it will promote network best practices. Considering how many attacks are from an employee doing something they shouldn&#8217;t, network best practices are extremely important.</p>
<h4 style="text-align: center;">
<a class="fancybox" href="#contact_form_pop"><span style="color: #ff6600;">Click to Subscribe</span></a></h4>
<div class="fancybox-hidden" style="display: none;">
<div id="contact_form_pop" style="text-align: center;">[contact-form-7 id=&#8221;1478&#8243; title=&#8221;Subscribe&#8221;]</div>
</div>
<p style="text-align: left;"><strong>Your Bathroom is as Important as Your Point of Sale System</strong></p>
<p>When selling a cybersecurity tool salespeople should consider the impact of integrating it into a network. For instance enabling two-factor authentication requires the install of an agent on every application or host device. This forces customers to make difficult decisions about what should and should not be secured.</p>
<p>The first applications to be secured are always those that handle Personally Identifiable Information (PII). These applications are important but so are the &#8220;non-critical&#8221; applications. How would your organization fair if it was the victim of a ransomware attack on its inventory database or client relationship management system. Salespeople should consider these gaps and help customers to resolve them.</p>
<p>Taking it back to Ryan Lochte&#8217;s alleged incident, I bet that gas station owner in Brazil sent all of his credit card data securely and that his cash register had a lock on it. He even paid to have security guards protect the premises 24/7. What he could not afford to protect was his bathroom and we all know how that ended. Ok that might be a stretch but you get my point.</p>
<p>In my <a href="http://telegrid.com/2016/08/why-is-cybersecurity-so-slow/"> last post </a>I discussed how we need to rethink cybersecurity tools from a security AND network performance standpoint. I think we also need to rethink how we sell cybersecurity tools.</p>
<p>Eric Sharret is Vice President of Business Development at <a href="http://www.telegrid.com">TELEGRID</a>.</p>
<h4 style="text-align: center;">
<a class="fancybox" href="#contact_form_pop"><span style="color: #ff6600;">Click to Subscribe</span></a></h4>
<div class="fancybox-hidden" style="display: none;">
<div id="contact_form_pop" style="text-align: center;">[contact-form-7 id=&#8221;1478&#8243; title=&#8221;Subscribe&#8221;]</div>
</div>
<p>Disclaimer: The opinions expressed here do not represent those of TELEGRID Technologies, Inc.  TELEGRID Technologies, Inc. will not be liable for any errors, omissions, or delays in this information or any losses, injuries, or damages arising from its display or use.  All information is provided on an as-is basis.</p>
<p>The post <a rel="nofollow" href="https://telegrid.com/ryan-lochte-cybersecurity-sales">Ryan Lochte and Cybersecurity Sales</a> appeared first on <a rel="nofollow" href="https://telegrid.com">TELEGRID</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Why is Cybersecurity So Slow?</title>
		<link>https://telegrid.com/why-is-cybersecurity-so-slow?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=why-is-cybersecurity-so-slow</link>
		
		<dc:creator><![CDATA[Eric Sharret]]></dc:creator>
		<pubDate>Fri, 19 Aug 2016 14:16:09 +0000</pubDate>
				<category><![CDATA[Authentication]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[identity and access management]]></category>
		<category><![CDATA[multi-factor authentication]]></category>
		<category><![CDATA[network performance]]></category>
		<guid isPermaLink="false">http://telegrid.com/?p=536</guid>

					<description><![CDATA[<p>Do cybersecurity vendors consider user experience?  We need to start designing solutions based on both network protection AND network performance.</p>
<p>The post <a rel="nofollow" href="https://telegrid.com/why-is-cybersecurity-so-slow">Why is Cybersecurity So Slow?</a> appeared first on <a rel="nofollow" href="https://telegrid.com">TELEGRID</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Two weeks ago I attended a US Military tradeshow that showcased the latest and greatest cybersecurity technologies.  As I sat and listened to the presenters the same question kept popping into my head.   It is a question that has bothered me for some time and no vendor has been able to answer appropriately.  I hit my breaking point when I heard a presenter discuss his company’s ability to put every packet in its own tunnel as part of something they call the Romulan cloaking technique (example of a bad analogy).  So, after the presenter finished I raised my hand and asked my question, looking for King Arthur to extract the proverbial Excalibur from my brain (example of a good analogy).</p>
<p><span style="color: #ff6600;"><strong>“WHAT ABOUT LATENCY?”</strong></span></p>
<p>Three simple but powerful words that show where cybersecurity has started to go wrong.  How can you put every packet in its own tunnel without massively affecting network performance?  Does user experience even matter anymore?</p>
<h4 style="text-align: center;">
<a class="fancybox" href="#contact_form_pop"><span style="color: #ff6600;">Click to Subscribe</span></a></h4>
<div class="fancybox-hidden" style="display: none;">
<div id="contact_form_pop" style="text-align: center;">[contact-form-7 id=&#8221;1478&#8243; title=&#8221;Subscribe&#8221;]</div>
</div>
<p>Is it just me or are new cybersecurity products just rehashes of old cybersecurity products?  We have gone from 128 bit encryption to 256 bit encryption.  We have gone from endpoint protection to advanced endpoint encryption.  We have gone from firewalls to next generation firewalls.  We have gone from deep packet inspection to deeper packet inspection to deepest packet inspection.  It is the same thing Hollywood did when they remade the greatest films of our generation like Ghostbusters and Vacation.</p>
<p>Do vendors stop and think about the effect they are having on network performance?  Indeed a Cisco survey found that <u>71% of Chief Executives think that cybersecurity slows down the pace of commerce</u>.  So how are vendors improving cybersecurity without affecting latency?  The answer seems to be more blade servers, faster processors, and ASICs.  This may work but it also translates into higher costs for the customer.  Are cybersecurity vendors starting to price themselves out of the market?</p>
<p>We need to rethink cybersecurity.  We need to start designing solutions based on both network protection AND network performance.  We need to look at our network from a holistic standpoint and identify existing tools that we can use for cybersecurity.  Let’s call it Cybersecurity 3.0!  (I know we skipped 2.0 but I was at a social media talk last week and the speaker used the term Web 3.0 so cybersecurity needs to catch up.)</p>
<p>In the next few weeks TELEGRID will be launching the first Cybersecurity 3.0 product which promises to turn the field of authentication on its head.  If you are not on it already then<strong> <span style="color: #ff6600;"><a style="color: #ff6600;" href="http://telegrid.com/join-mailing-list/">Join Our Mailing List</a> </span></strong>so you do not miss the release.  In the meantime if you are looking for a secure authentication tool give me a call at 973-994-4440 and I will give you a sneak peek.</p>
<p>&nbsp;</p>
<p>Eric Sharret is Vice President of Business Development at <a href="http://www.telegrid.com">TELEGRID</a>.</p>
<h4 style="text-align: center;">
<a class="fancybox" href="#contact_form_pop"><span style="color: #ff6600;">Click to Subscribe</span></a></h4>
<div class="fancybox-hidden" style="display: none;">
<div id="contact_form_pop" style="text-align: center;">[contact-form-7 id=&#8221;1478&#8243; title=&#8221;Subscribe&#8221;]</div>
</div>
<p>Disclaimer: The opinions expressed here do not represent those of TELEGRID Technologies, Inc.  The Company will not be held liable for any errors, omissions, or delays in this information or any losses, injuries, or damages arising from its display or use.  All information is provided on an as-is basis.</p>
<p>The post <a rel="nofollow" href="https://telegrid.com/why-is-cybersecurity-so-slow">Why is Cybersecurity So Slow?</a> appeared first on <a rel="nofollow" href="https://telegrid.com">TELEGRID</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
