Let’s face it, when it comes to hacks we have become, well, quite complacent. We figure it is out of our control anyway and it’s not like we are going to go off grid. Right? Besides its just data, not like they can physically hurt us. I thought so too until I watched a 2014
Category Archives: Uncategorized
The General Data Protection Regulation (GDPR) just went into effect in the European Union. It is a law that is designed to protect the privacy of individuals by requiring explicit permission for data collection and the enforcement of strict data usage policies. Companies, specifically those that employ machine learning, have complained about the onerous regulation,
Last week Senators Ron Wyden and Claire McCaskill released a letter demanding that US Customs and Border Patrol (CBP) close a critical gap in our nation’s border security. The gap is not related to the border wall or drug submarines, but that we are not checking digital signatures on e-Passports. Even though it sounds like
3 Ways Blockchain Can Improve PKI When it comes to technology buzzwords there are few bigger than blockchain. Speak with any overexcited technologist and you will get an hour lecture about how it is the future of secure transactions. The benefits of blockchain technology are that it is public, distributed, and tamper-resistant. Indeed blockchain technology
Forbes Magazine had an interesting article last month about security vulnerabilities in home security products from SimpliSafe, Samsung, Comcast and others. The author highlighted the usual vulnerabilities including default passwords and unencrypted signaling, but, there was one quote that I found particularly interesting. When quoting the security expert Dr Andrew Zonenberg the author wrote “SimpliSafe
I recently attended a local chapter meeting of the Open Web Application Security Project (OWASP) where I saw something amazing. A white hat hacker was discussing methods to reverse hashing with common password dictionaries and as part of their demonstration they literally pulled a hashed password out of thin air. The tool that the white
Every once in a while I read an interesting cybersecurity study that I feel deserves its own blog post. It usually describes a successful cyber-attack that exist at the intersection of three things: organizational ambivalence, botnet technology and the human element. The reason why I find this type of attack so interesting is that it
PwC released its Global State of Information Security® Survey 2017 which is based on responses of 10,000 C-level executives from over 133 countries. In the results PwC found that “59% of survey respondents say they are boosting their spending on security as a result of digitization.” Hidden within the survey is the growing importance of
Every day there are new headlines about stolen passwords. Multi-Factor Authentication is the only true prevention but how do we MFA-enable applications and devices that are not MFA-capable today.
TELEGRID was pleased to host a Town Hall meeting by the Chairman of the House Appropriations Defense Subcommittee Rodney P. Frelinghuysen at TELEGRID’s Florham Park offices on April 6th.