Archives: Blog Posts

Home » Blog Post

Three Consultants No Business Can Be Without

“Companies need to manage and mitigate cybersecurity risk the same way they look at any other risk.” 

Phishing Season has Opened – Don’t Get Hooked!

Phishing is the most prevalent means for an organization to get breached. According to a variety of sources, 95% of cyber attacks begin with a phishing email. It is much easier to craft an email and get a user to respond than it is to brute force your way into a network past firewalls and […]

Startups, Cybersecurity and Minority Representation — Security Awareness (CyberSpeak Podcast)

Originally Posted on InfoSec Institute in Cyberspeak Podcast, Security Awareness on September 8, 2018)   On this episode of the CyberSpeak with InfoSec Institute podcast, Ron Gula, president of Gula Tech Adventures and co-founder of Tenable Network Security, talks about the evolution of cybersecurity and security awareness, his career shift from the NSA to growing Tenable to funding other cybersecurity startups, […]

The Case for a National Cybersecurity Agency

Originally Published on Politico on September 5, 2018 By DAVID H. PETRAEUS and KIRAN SRIDHAR. Our grab-bag approach isn’t working. Gen. David Petraeus says it’s time to go big. Recent reports that Russia has been attempting to install malware in our electrical grid and that its hackers have infiltrated utility-control rooms across America should constitute a significant wakeup call. […]

7 Ways to Identify Darknet Cybersecurity Risks

Originally published on 6 Aug 2018 by SecurityIntelligence   The dark component of the deep web is the primary highway for the exchange and commerce among cybercriminal groups. In fact, very few cybercriminals work alone. Eighty percent of cybercrime is linked to criminal collectives, and stolen data-shaped goods surface rapidly on darknet forums and marketplaces following cybersecurity incidents […]

Mental health is new focus at premier cybersecurity conference

Originally published 7 August 2018 on AXIOS   LAS VEGAS — At this week’s Black Hat cybersecurity conference, panels about hacking automobiles and airplane WiFi are being interspersed with a new focus: mental health.   Why it matters: Issues like anxiety and depression aren’t new in the cybersecurity field, and stress is rampant: pros work long […]

3 Steps For Putting the Department of Homeland Security Cybersecurity Strategy to Work

Originally Published on July 30, 2018 by FCW   A few weeks ago, the Department of Homeland Security released its cybersecurity strategy for the next five years, which lays out seven goals to help the government better defend itself against the constant onslaught of sophisticated cyber threats. These goals include assessing evolving cybersecurity risks, protecting critical infrastructure, […]

Guide for SMBs – Choosing the Best Managed Security Service Provider

Originally posted by Loki Labs on July 25, 2018     If you’re a small company searching for assistance in securing your business, congratulations. While a large percentage of cyber attacks were directed at small businesses in the last few years[1,2,3], many of these organizations still don’t take cyber threats seriously and the cost of […]

Detecting and Mitigating Unlikely Cyber Attack Vectors 

Written by Jaeda Bostock for   The connected world has given rise to new kinds of threats. Last year, major corporations were hit with cyber breaches that cost them valuable data, time, and their reputations. This just goes to show how important it is for modern companies to learn about potential threats, as well as […]

The Cybersecurity 202: Maryland ballot snafu offers lessons in how to respond to an election hack

Originally published by The Washington Post on 26 June 2018   Maryland may be getting a dry run in how to respond to an election cyberattack. State officials say a computer glitch prevented the Board of Elections from updating voter registration data for as many as 80,000 voters. As a result, droves of people will have […]

Skip to toolbar