Author Archives: csbwpadmin

  • NSA “Systematically Moving” all it’s Data to the Cloud

    Posted on June 22, 2018 by in Cloud, Security

    The National Security Agency has moved most of the mission data it collects, analyzes and stores into a classified cloud computing environment known as the Intelligence Community GovCloud. The IC GovCloud is a single integrated “big data fusion environment” that allows analysts to rapidly “connect the dots” across all NSA’s data sources, according to Chief […]

    Comments Off on NSA “Systematically Moving” all it’s Data to the Cloud Continue Reading...
  • Verizon’s 2018 Data Breach Investigations Report

    Posted on June 15, 2018 by in News

    Data breaches aren’t just a problem for security professionals. The impact is felt across the whole business—from your legal team, embroiled in litigation, to your frontline employees, who can’t access the tools they need to do their jobs. Everyone needs to play their part in managing the risks. But first you need to understand what […]

    Comments Off on Verizon’s 2018 Data Breach Investigations Report Continue Reading...
  • Forget the “Missing Link”. How about the Weakest Link?

    Posted on June 8, 2018 by in News, Security

    Is User Training the Weakest Link in Your Email Security Strategy?   The days of simply deploying an email security gateway in front of the email server to block spam and viruses from reaching your end users are long gone. And while today’s gateways absolutely still have their place, in most instances they’re accompanied by […]

    Comments Off on Forget the “Missing Link”. How about the Weakest Link? Continue Reading...
  • Checklist for Safeguarding Virtual Machines

    Posted on June 1, 2018 by in News, Security, Virtualization

    Virtualization and the cloud are a boon for developers and businesses that create applications. Virtual infrastructures give businesses and developers cost-effective, dynamic, and agile ways of providing their products and services or deploying their own applications. With the public cloud expected to grow into a US$178-billion market this year, there’s an evident shift toward automation and scalability […]

    Comments Off on Checklist for Safeguarding Virtual Machines Continue Reading...
  • New VPNFilter Malware Targets at least 500K Networking Devices Worldwide

    Posted on May 25, 2018 by in News, Security

      For several months, Talos has been working with public- and private-sector threat intelligence partners and law enforcement in researching an advanced, likely state-sponsored or state-affiliated actor’s widespread use of a sophisticated modular malware system we call “VPNFilter.” We have not completed our research, but recent events have convinced us that the correct way forward […]

    Comments Off on New VPNFilter Malware Targets at least 500K Networking Devices Worldwide Continue Reading...
  • How bad was Equifax’s data breach? Bad.

    Posted on May 18, 2018 by in News, Security

    For the first time, Equifax is revealing just how much personal data was exposed in the massive data breach that affected more than 148 million Americans.  In a new filing with the Securities and Exchange Commission, the credit reporting agency broke down in detail the types of – and how much exactly – sensitive personal information was exposed to hackers in the breach. […]

    Comments Off on How bad was Equifax’s data breach? Bad. Continue Reading...
  • Think Credit Freezes Have You Covered? Think Again.

    Posted on May 11, 2018 by in Security

    I spent a few days last week speaking at and attending a conference on responding to identity theft. The forum was held in Florida, one of the major epicenters for identity fraud complaints in United States. One gripe I heard from several presenters was that identity thieves increasingly are finding ways to open new mobile […]

    Comments Off on Think Credit Freezes Have You Covered? Think Again. Continue Reading...
  • Russian Hackers Targeting Cisco Smart Install Protocol Systems

    Posted on April 18, 2018 by in News, Security

    Cisco Systems has identified more than 168,000 systems that are potentially exposed via its Cisco Smart Install Client, which the U.S. government said is being targeted by Russian state-sponsored hackers. In an alert issued April 16, the U.S. Computer Emergency Readiness Team said Russian hackers are attacking networking devices, network management protocols and the Cisco […]

    Comments Off on Russian Hackers Targeting Cisco Smart Install Protocol Systems Continue Reading...
  • Three Approaches to Spear Phishing

    Posted on April 17, 2018 by in News

    There are multiple ways spear phishing attacks can be foiled.  While it is best to stop the phishing emails from reaching your colleagues in the first place, stopping the attack at any point will “break the attack chain”.  Good security technology, good security practice, and good security training are all helpful stopping spear phishing.   […]

    Comments Off on Three Approaches to Spear Phishing Continue Reading...
  • Campus Cybersecurity 101

    Posted on April 13, 2018 by in News, Security

    The proliferation of personal mobile devices and homegrown hackers on today’s campuses—not to mention the open, collaborative nature of college environments in general—make cybersecurity particularly challenging in higher education. It’s no wonder cybercriminals consider colleges and universities easy targets. Once a breach in a university’s network occurs, the entire campus can be vulnerable. That’s why […]

    Comments Off on Campus Cybersecurity 101 Continue Reading...