BREAKTHROUGH LISTEN 2019

Breakthrough Listen Teams Up with SETI Institute to Host Out of This World Wireless Research Conference

The GNU Radio Foundation recently teamed up with the UC Berkeley SETI Research Center and the Breakthrough Listen project to sponsor the SETI RF Hackathon, an unprecedented wireless hackathon event. Encompassing the ultimate in Internet-of-Things (IoT) and signals hacking, professionals specializing in machine learning, radio frequency (RF), and cyber security converged at the Allen Telescope Array in California in May…. Read More

Ransomware and baltimore cyber attack

Lessons from the Baltimore Cyber Attack—Are You Doing Enough to Protect Your Business?

Baltimore is feeling the heat from a recent cyber attack involving ransomware that’s crippling the city’s computers. News reports say experts are debating if the strain of ransomware involved in the attack, Robbinhood, leveraged NSA hacking tool EternalBlue. While the Baltimore incident is getting the most attention, other local governments are being hit, too. Earlier this year, two… Read More

Person monitoring cyber security logs on a computer.

Managing Your Security Logs: More than Just Set and Forget

Organizations log thousands of security-related events every day from an array of devices and software.  So, what’s the best way to go about managing your security logs? The reality is, most of the time, no one looks at these logs unless they have a security incident or data breach. Some security professionals suggest that if… Read More

Person on a computer working.

CISO Life: How Are You Holding Up?

As a consultant, I’ve been advising and supporting security leaders like Chief Information Security Officers (CISOs) for several years now. I’m always intrigued by the organizational nuances of each role and each person in the seat. Let’s face it: being a CISO is not an easy job. To be successful in the role requires a lot of support from executive… Read More

Image of a computer, on a desk and a mouse.

How Regular Cyber Security Assessments and Audits Help Your Organization

Understanding your weaknesses through regular cyber security assessments and audits is critical. Without them, it’s difficult to withstand cyber attacks and protect your organization. As the wise Japanese author Shusaku Endo noted, ““Every weakness contains within itself a strength.” Knowing your weaknesses helps you focus on what you need to do to improve your cyber security posture…. Read More