<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>cybersecurity &#8211; TELEGRID</title>
	<atom:link href="https://telegrid.com/tag/cybersecurity/feed" rel="self" type="application/rss+xml" />
	<link>https://telegrid.com</link>
	<description></description>
	<lastBuildDate>Mon, 05 Feb 2018 22:00:31 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=5.6.13</generator>

<image>
	<url>https://telegrid.com/wp-content/uploads/2022/09/cropped-Screen-Shot-2022-08-29-at-9.50.37-AM-32x32.png</url>
	<title>cybersecurity &#8211; TELEGRID</title>
	<link>https://telegrid.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Government Activism and IoT</title>
		<link>https://telegrid.com/government-activism-and-iot?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=government-activism-and-iot</link>
		
		<dc:creator><![CDATA[Eric Sharret]]></dc:creator>
		<pubDate>Tue, 17 Jan 2017 16:23:05 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Embedded Software]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[embedded security]]></category>
		<category><![CDATA[IoT]]></category>
		<guid isPermaLink="false">http://telegrid.com/?p=985</guid>

					<description><![CDATA[<p>The Mirai Botnet Distributed Denial of Service (DDoS) attack of September and October 2016 gave a brief glimpse of the effect Internet of Things (IoT) devices can have on the greater Internet.  This event was &#8230;</p>
<p>The post <a rel="nofollow" href="https://telegrid.com/government-activism-and-iot">Government Activism and IoT</a> appeared first on <a rel="nofollow" href="https://telegrid.com">TELEGRID</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>The Mirai Botnet Distributed Denial of Service (DDoS) attack of September and October 2016 gave a brief glimpse of the effect Internet of Things (IoT) devices can have on the greater Internet.  This event was especially felt in Washington, D.C. where there seems to be an uptick in the amount of Government activism and IoT and the frequency and scale of intervention with IoT device manufacturers.  The following are just a few examples:</p>
<ul>
<li>On December 30, 2016 the Congressional Internet of Things Working Group released a <a href="http://latta.house.gov/uploadedfiles/iot_working_group_white_paper.pdf">white paper</a> on IoT stating that, “Recent examples of cyberattacks on IoT devices have exposed not just the potential impact on individual consumers, but the possible vulnerability on the broader Internet infrastructure.”</li>
</ul>
<ul>
<li>On January 5, 2017 the Federal Trade Commission issued a <a href="https://www.ftc.gov/system/files/documents/cases/170105_d-link_complaint_and_exhibits.pdf">complaint</a> against D-Link claiming that D-Link’s “routers and cameras have been vulnerable to attacks that subject consumers’ sensitive personal information and local networks to a significant risk of unauthorized access.”</li>
</ul>
<ul>
<li>On January 9, 2017 the Federal Drug Administration released a <a href="http://www.fda.gov/MedicalDevices/Safety/AlertsandNotices/ucm535843.htm">note</a> about St. Jude Medical stating that its devices had vulnerabilities that, “if exploited, could allow an unauthorized user, i.e., someone other than the patient&#8217;s physician, to remotely access a patient&#8217;s RF-enabled implanted cardiac device.”</li>
</ul>
<ul>
<li>On January 12, 2017 the Department of Commerce released a <a href="https://www.ntia.doc.gov/files/ntia/publications/iot_green_paper_01122017.pdf">Green Paper</a> highlighting the security concerns around IoT. It states that the DDoS attack, “was the most visible and far-reaching example of the potential risks that must be mitigated when considering IoT.”</li>
</ul>
<p>It appears that this the beginning of an activist approach taken by the Government to monitor IoT device manufacturers.  Indeed, the Congressional Internet of Things Working Group white paper states that participants, “grappled with whether or not a solution should rely on industry established standards, agency recommendations, legislation, or a combination of all the above.”</p>
<h4 style="text-align: center;"><a class="fancybox" href="#contact_form_pop"><span style="color: #ff6600;">Click to Subscribe</span></a></h4>
<div class="fancybox-hidden" style="display: none;">
<div id="contact_form_pop" style="text-align: center;">[contact-form-7 id=&#8221;1478&#8243; title=&#8221;Subscribe&#8221;]</div>
</div>
<p>TELEGRID is a designer of <a href="http://telegrid.com/embedded-software-security/">secure embedded systems</a> for the US Military and has developed a <a href="http://telegrid.com/embedded-software-security/">framework</a> to design systems in line with DISA’s Security Technical Implementation Guides (DISA STIGs).  While some commercial manufacturers follow NIST guidelines others ignore security completely.  As Senator Mark Warner, co-founder of the Senate Cybersecurity Caucus <a href="http://www.warner.senate.gov/public/index.cfm/pressreleases?ContentRecord_id=CD1BBB25-83E0-494D-B7E1-1C350A7CFCCA">stated</a>, “Manufacturers today are flooding the market with cheap, insecure devices, with few market incentives to design the products with security in mind, or to provide ongoing support.”</p>
<p>Is the Government going to “incentivize” commercial manufacturers to bake in security?  Will the Government shut certain companies out of the market for selling unsecure IoT devices?  What will be the cost impact to consumers?</p>
<p>These are all very tough questions and it seems the Government is moving quickly to try to answer them.  Are IoT manufacturers paying attention?</p>
<p>&nbsp;</p>
<p>Eric Sharret is Vice President of Business Development at <a href="http://www.telegrid.com/">TELEGRID</a>.  TELEGRID has unique expertise in secure embedded systems, secure authentication, PKI, Multi-Factor Authentication (MFA).</p>
<p>&nbsp;</p>
<h4 style="text-align: center;"><a class="fancybox" href="#contact_form_pop"><span style="color: #ff6600;">Click to Subscribe</span></a></h4>
<div class="fancybox-hidden" style="display: none;">
<div id="contact_form_pop" style="text-align: center;">[contact-form-7 id=&#8221;1478&#8243; title=&#8221;Subscribe&#8221;]</div>
</div>
<p>Disclaimer: The opinions expressed here do not represent those of TELEGRID Technologies, Inc.  The Company will not be held liable for any errors, omissions, or delays in this information or any losses, injuries, or damages arising from its display or use.  All information is provided on an as-is basis.</p>
<p>The post <a rel="nofollow" href="https://telegrid.com/government-activism-and-iot">Government Activism and IoT</a> appeared first on <a rel="nofollow" href="https://telegrid.com">TELEGRID</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Should I protect my possessions or my identity?</title>
		<link>https://telegrid.com/protect-my-possessions-or-my-identity?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=protect-my-possessions-or-my-identity</link>
		
		<dc:creator><![CDATA[Eric Sharret]]></dc:creator>
		<pubDate>Tue, 20 Dec 2016 22:09:10 +0000</pubDate>
				<category><![CDATA[Authentication]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[authentication]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[identity and access management]]></category>
		<guid isPermaLink="false">http://telegrid.com/?p=969</guid>

					<description><![CDATA[<p>Last week, while driving, an advertisement came on the radio for a home security system.  I already have a home security system but the ad still caught my attention.  As I listened I started to &#8230;</p>
<p>The post <a rel="nofollow" href="https://telegrid.com/protect-my-possessions-or-my-identity">Should I protect my possessions or my identity?</a> appeared first on <a rel="nofollow" href="https://telegrid.com">TELEGRID</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Last week, while driving, an advertisement came on the radio for a home security system.  I already have a home security system but the ad still caught my attention.  As I listened I started to think about how much I pay each month to protect my physical possessions.  Then I wondered why I am willing to pay so much to protect a $500 TV but nothing to protect my digital identity.  This begged the question, if I had to choose, should I protect my possessions or my identity?</p>
<p>I believe that in order to answer this question properly we must make three comparisons:</p>
<ol>
<li>The average loss for a home burglary versus the average loss for an identity theft</li>
<li>The probability of a home burglary versus the probability of an identity theft</li>
<li>The cost of a home security system versus the cost of identity theft protection</li>
</ol>
<p>In its report on <a href="https://ucr.fbi.gov/crime-in-the-u.s/2014/crime-in-the-u.s.-2014/offenses-known-to-law-enforcement/burglary">Crime in the United States</a>, the FBI found that in 2014 the average dollar loss per burglary offense was $2,251.  This is higher than the average dollar loss for identity theft over the same time frame which was $1,343 according to the <a href="http://www.bjs.gov/content/pub/pdf/vit14.pdf">Department of Justice</a>.</p>
<h4 style="text-align: center;"><a class="fancybox" href="#contact_form_pop"><span style="color: #ff6600;">Click to Subscribe</span></a></h4>
<div class="fancybox-hidden" style="display: none;">
<div id="contact_form_pop" style="text-align: center;">[contact-form-7 id=&#8221;1478&#8243; title=&#8221;Subscribe&#8221;]</div>
</div>
<p>However, when considering the number of occurrences, identity theft is far more likely than a burglary.  The DoJ reported 17.6 million cases of identity theft, or 7% of all US residents above the age of 16, in 2014.  This was 10 times more than the 1.7 million burglaries that were reported over the same time period by the FBI.</p>
<p>In terms of cost it is difficult to gauge exact figures based on the multitude of offerings for both home security systems and identity theft protection.  However, it seems that identity theft protection is the same or less per month than a home security system.</p>
<p>I understand that a home security system also provides the intangible value of personal protection and that there is no value that you can put on peace of mind.  However, I could counter that the majority of burglaries happen between the hours of 10AM and 3PM, when the homeowner is not home, and therefore personal protection has no inherent value.</p>
<p>So, should I protect my possessions or my identity? Based on this very simple statistical comparison it seems that, if I had to choose, I should protect my digital identity before I protect my physical possessions.  What would you pay to protect?</p>
<p>&nbsp;</p>
<p>Eric Sharret is Vice President of Business Development at <a href="http://www.telegrid.com">TELEGRID</a>.  TELEGRID has unique expertise in secure authentication, PKI and Multi-Factor Authentication (MFA).</p>
<h4 style="text-align: center;"><a class="fancybox" href="#contact_form_pop"><span style="color: #ff6600;">Click to Subscribe</span></a></h4>
<div class="fancybox-hidden" style="display: none;">
<div id="contact_form_pop" style="text-align: center;">[contact-form-7 id=&#8221;1478&#8243; title=&#8221;Subscribe&#8221;]</div>
</div>
<p>Disclaimer: The opinions expressed here do not represent those of TELEGRID Technologies, Inc.  The Company will not be held liable for any errors, omissions, or delays in this information or any losses, injuries, or damages arising from its display or use.  All information is provided on an as-is basis.</p>
<p>The post <a rel="nofollow" href="https://telegrid.com/protect-my-possessions-or-my-identity">Should I protect my possessions or my identity?</a> appeared first on <a rel="nofollow" href="https://telegrid.com">TELEGRID</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Why is Cybersecurity So Slow?</title>
		<link>https://telegrid.com/why-is-cybersecurity-so-slow?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=why-is-cybersecurity-so-slow</link>
		
		<dc:creator><![CDATA[Eric Sharret]]></dc:creator>
		<pubDate>Fri, 19 Aug 2016 14:16:09 +0000</pubDate>
				<category><![CDATA[Authentication]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[identity and access management]]></category>
		<category><![CDATA[multi-factor authentication]]></category>
		<category><![CDATA[network performance]]></category>
		<guid isPermaLink="false">http://telegrid.com/?p=536</guid>

					<description><![CDATA[<p>Do cybersecurity vendors consider user experience?  We need to start designing solutions based on both network protection AND network performance.</p>
<p>The post <a rel="nofollow" href="https://telegrid.com/why-is-cybersecurity-so-slow">Why is Cybersecurity So Slow?</a> appeared first on <a rel="nofollow" href="https://telegrid.com">TELEGRID</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Two weeks ago I attended a US Military tradeshow that showcased the latest and greatest cybersecurity technologies.  As I sat and listened to the presenters the same question kept popping into my head.   It is a question that has bothered me for some time and no vendor has been able to answer appropriately.  I hit my breaking point when I heard a presenter discuss his company’s ability to put every packet in its own tunnel as part of something they call the Romulan cloaking technique (example of a bad analogy).  So, after the presenter finished I raised my hand and asked my question, looking for King Arthur to extract the proverbial Excalibur from my brain (example of a good analogy).</p>
<p><span style="color: #ff6600;"><strong>“WHAT ABOUT LATENCY?”</strong></span></p>
<p>Three simple but powerful words that show where cybersecurity has started to go wrong.  How can you put every packet in its own tunnel without massively affecting network performance?  Does user experience even matter anymore?</p>
<h4 style="text-align: center;">
<a class="fancybox" href="#contact_form_pop"><span style="color: #ff6600;">Click to Subscribe</span></a></h4>
<div class="fancybox-hidden" style="display: none;">
<div id="contact_form_pop" style="text-align: center;">[contact-form-7 id=&#8221;1478&#8243; title=&#8221;Subscribe&#8221;]</div>
</div>
<p>Is it just me or are new cybersecurity products just rehashes of old cybersecurity products?  We have gone from 128 bit encryption to 256 bit encryption.  We have gone from endpoint protection to advanced endpoint encryption.  We have gone from firewalls to next generation firewalls.  We have gone from deep packet inspection to deeper packet inspection to deepest packet inspection.  It is the same thing Hollywood did when they remade the greatest films of our generation like Ghostbusters and Vacation.</p>
<p>Do vendors stop and think about the effect they are having on network performance?  Indeed a Cisco survey found that <u>71% of Chief Executives think that cybersecurity slows down the pace of commerce</u>.  So how are vendors improving cybersecurity without affecting latency?  The answer seems to be more blade servers, faster processors, and ASICs.  This may work but it also translates into higher costs for the customer.  Are cybersecurity vendors starting to price themselves out of the market?</p>
<p>We need to rethink cybersecurity.  We need to start designing solutions based on both network protection AND network performance.  We need to look at our network from a holistic standpoint and identify existing tools that we can use for cybersecurity.  Let’s call it Cybersecurity 3.0!  (I know we skipped 2.0 but I was at a social media talk last week and the speaker used the term Web 3.0 so cybersecurity needs to catch up.)</p>
<p>In the next few weeks TELEGRID will be launching the first Cybersecurity 3.0 product which promises to turn the field of authentication on its head.  If you are not on it already then<strong> <span style="color: #ff6600;"><a style="color: #ff6600;" href="http://telegrid.com/join-mailing-list/">Join Our Mailing List</a> </span></strong>so you do not miss the release.  In the meantime if you are looking for a secure authentication tool give me a call at 973-994-4440 and I will give you a sneak peek.</p>
<p>&nbsp;</p>
<p>Eric Sharret is Vice President of Business Development at <a href="http://www.telegrid.com">TELEGRID</a>.</p>
<h4 style="text-align: center;">
<a class="fancybox" href="#contact_form_pop"><span style="color: #ff6600;">Click to Subscribe</span></a></h4>
<div class="fancybox-hidden" style="display: none;">
<div id="contact_form_pop" style="text-align: center;">[contact-form-7 id=&#8221;1478&#8243; title=&#8221;Subscribe&#8221;]</div>
</div>
<p>Disclaimer: The opinions expressed here do not represent those of TELEGRID Technologies, Inc.  The Company will not be held liable for any errors, omissions, or delays in this information or any losses, injuries, or damages arising from its display or use.  All information is provided on an as-is basis.</p>
<p>The post <a rel="nofollow" href="https://telegrid.com/why-is-cybersecurity-so-slow">Why is Cybersecurity So Slow?</a> appeared first on <a rel="nofollow" href="https://telegrid.com">TELEGRID</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Does the death of the CAC mean the death of PKI?</title>
		<link>https://telegrid.com/does-the-death-of-the-cac-mean-the-death-of-pki?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=does-the-death-of-the-cac-mean-the-death-of-pki</link>
		
		<dc:creator><![CDATA[Eric Sharret]]></dc:creator>
		<pubDate>Mon, 18 Jul 2016 20:08:30 +0000</pubDate>
				<category><![CDATA[Authentication]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[authentication]]></category>
		<category><![CDATA[common access card]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[public key infrastructure]]></category>
		<guid isPermaLink="false">http://telegrid.com/?p=516</guid>

					<description><![CDATA[<p>The DoD CIO Terry Halvorsen made a bold call for the replacement of the CAC within the next two years.  If there is no more CAC how can the DoD maintain its PKI?</p>
<p>The post <a rel="nofollow" href="https://telegrid.com/does-the-death-of-the-cac-mean-the-death-of-pki">Does the death of the CAC mean the death of PKI?</a> appeared first on <a rel="nofollow" href="https://telegrid.com">TELEGRID</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><meta name="keywords" content="common access card, common access cards, cac future, cac going away, authentication, authorization, public key infrastructure, military pki" /></p>
<p>Last month the Department of Defense Chief Information Officer Terry Halvorsen made a bold call for the <a href="http://federalnewsradio.com/defense/2016/06/dod-plans-bring-cac-cards-end/">replacement of Common Access Cards</a> within the next two years.  Common Access Cards, or CACs, are credit-card-sized smartcards used to provide Two-Factor Authentication (2FA) to DoD networks.  This method of access requires two out of three of the following items:</p>
<ul>
<li>Something the user knows</li>
<li>Something the user has</li>
<li>Something the user is</li>
</ul>
<p>A CAC – “something a user has” &#8211; in conjunction with a PIN – “something a user knows” – provides the required 2FA.  The issue Mr. Halvorsen has with CACs is that they do not work well in a tactical environment.  As he said, “It’s really hard to issue CAC cards &#8230; when people are dropping mortar shells on you and you need to get in your systems.”</p>
<p>So what will we use instead of CACs?  Mr. Halvorsen mentions Biometrics as part of the solution.  Biometrics, or “something the user is”, includes physical characteristics like fingerprints or behavioral characteristics like how many times a user misspells Halvorsen in a blog post (purely hypothetical).  I discussed some of the security concerns surrounding Biometrics in a <a href="http://telegrid.com/2016/05/assured-identity-giving-apps-the-finger/">previous post</a> but the biggest issue seems to be with public key cryptography.  In public key cryptography the user maintains a secured private key and shares a public key with the world.  The private key is stored on the CAC and is unlocked with a PIN as part of the DoD Public Key Infrastructure (PKI).</p>
<h4 style="text-align: center;"><a class="fancybox" href="#contact_form_pop"><span style="color: #ff6600;">Click to Subscribe</span></a></h4>
<div class="fancybox-hidden" style="display: none;">
<div id="contact_form_pop" style="text-align: center;">[contact-form-7 id=&#8221;1478&#8243; title=&#8221;Subscribe&#8221;]</div>
</div>
<p>If there is no more CAC, does that mean there is no more private key?  We can derive passwords from Biometrics, for instance fingerprints have enough entropy for the equivalent strength of a <a href="http://lukenotricks.blogspot.com/2009/04/on-entropy-of-fingerprints.html">13 character password</a>, but it is not public key cryptography.  If there is no more public key cryptography how can the DoD maintain its PKI?</p>
<p>I believe this highlights a very interesting debate on the difference between authentication and encryption.  If we look back at the earliest days of authentication, passwords were often sent in the clear (e.g., Password Authentication Protocol (PAP)).  It was assumed that the channel would be encrypted and all information, including passwords, would be encrypted by the channel.  Authentication was merely used for authorization and accounting.  It was not until we moved from point-to-point networks to the Internet that we combined authentication and encryption in PKI.  Is Mr. Halvorsen telling us that we no longer need PKI?</p>
<p>I do not believe this is the case because at a <a href="http://federalnewsradio.com/reporters-notebook-jason-miller/2016/06/halvorsen-firing-effect-calling-end-cac/">luncheon</a> following the CAC elimination comment Mr. Halvorsen made a point of recognizing the need for PKI.  As he said, “I want to make it clear, when we replace the CAC card, it will be public-key infrastructure.”   Mr. Halvorsen suggested using Derived Credentials in conjunction with Biometrics to simplify authentication and maintain PKI.  Derived Credentials is a software-based version of the CAC contained in an electronic device such as a smartphone.  In that architecture Biometrics would unlock the electronic device while a user’s certificate and associated private key would be stored in the Derived Credentials.</p>
<p>Derived Credentials is intriguing because it heralds the ability to Bring Your Own Device (BYOD).  The only issue is current policy (i.e., NIST 800-157) which requires that credentials issued at Level of Assurance (LOA) 4 be kept in a hardware cryptographic module that has been validated to FIP 140-2 Level 2.  This means you may need a special hardware solution which is an issue for BYOD.</p>
<p>The moral of the story is that the DoD is now committed to changing how users authenticate themselves and that we should expect to see big changes in the next few years.  This will make it difficult for the Government to purchase devices or applications that have a fixed authentication mechanism.  Perhaps this is the reason we are seeing so much interest in applications that allow a flexible authentication mechanism, like TELEGRID’s <a href="http://telegrid.com/authentication-authorization/">SMRTe</a>.</p>
<p>Eric Sharret is Vice President of Business Development at <a href="http://www.telegrid.com">TELEGRID</a>.</p>
<h4 style="text-align: center;"><a class="fancybox" href="#contact_form_pop"><span style="color: #ff6600;">Click to Subscribe</span></a></h4>
<div class="fancybox-hidden" style="display: none;">
<div id="contact_form_pop" style="text-align: center;">[contact-form-7 id=&#8221;1478&#8243; title=&#8221;Subscribe&#8221;]</div>
</div>
<p>Disclaimer: The opinions expressed here do not represent those of TELEGRID Technologies, Inc.  TELEGRID Technologies, Inc. will not be liable for any errors, omissions, or delays in this information or any losses, injuries, or damages arising from its display or use.  All information is provided on an as-is basis.</p>
<p>The post <a rel="nofollow" href="https://telegrid.com/does-the-death-of-the-cac-mean-the-death-of-pki">Does the death of the CAC mean the death of PKI?</a> appeared first on <a rel="nofollow" href="https://telegrid.com">TELEGRID</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
