The GNU Radio Foundation recently teamed up with the UC Berkeley SETI Research Center and the Breakthrough Listen project to sponsor the SETI RF Hackathon, an unprecedented wireless hackathon event. Encompassing the ultimate in Internet-of-Things (IoT) and signals hacking, professionals specializing in machine learning, radio frequency (RF), and cyber security converged at the Allen Telescope Array in California in May…. Read More
Category: Cyber Security Strategy
Lessons from the Baltimore Cyber Attack—Are You Doing Enough to Protect Your Business?
Baltimore is feeling the heat from a recent cyber attack involving ransomware that’s crippling the city’s computers. News reports say experts are debating if the strain of ransomware involved in the attack, Robbinhood, leveraged NSA hacking tool EternalBlue. While the Baltimore incident is getting the most attention, other local governments are being hit, too. Earlier this year, two… Read More
Managing Your Security Logs: More than Just Set and Forget
Organizations log thousands of security-related events every day from an array of devices and software. So, what’s the best way to go about managing your security logs? The reality is, most of the time, no one looks at these logs unless they have a security incident or data breach. Some security professionals suggest that if… Read More
Are Your Third-Party Vendors Putting You at Risk?
The past few years have given us not only a staggering amount of Marvel movies, but eye-wateringly expensive data breaches. Some of the most costly and devastating breaches occurred as a result of cyber criminals taking advantage of security weaknesses in third-party vendors. So, are your third-party vendors putting you at risk? Even a single… Read More
CISO Life: How Are You Holding Up?
As a consultant, I’ve been advising and supporting security leaders like Chief Information Security Officers (CISOs) for several years now. I’m always intrigued by the organizational nuances of each role and each person in the seat. Let’s face it: being a CISO is not an easy job. To be successful in the role requires a lot of support from executive… Read More
How Regular Cyber Security Assessments and Audits Help Your Organization
Understanding your weaknesses through regular cyber security assessments and audits is critical. Without them, it’s difficult to withstand cyber attacks and protect your organization. As the wise Japanese author Shusaku Endo noted, ““Every weakness contains within itself a strength.” Knowing your weaknesses helps you focus on what you need to do to improve your cyber security posture…. Read More