Articles
-
Articles
New Malware Techniques
Researchers at Palo Alto Networks found Xbash lurking around and believe that the Chinese speaking Iron Group (also known as Rocke) has their grubby hands in it.
Read moreJuly 05, 2019
-
Articles
Tips for Securing Your Mobile Devices
Nearly all of us these days have some type of mobile device that is essentially a part of us. It is filled with all kinds of personal information, such as our contacts, our email conversations, and perhaps even our health information.
Read moreJuly 03, 2019
-
Articles
Rise in Ransomware Attacks
Organizations are facing drastic increases in ransomware attacks. A report by Malwarebytes finds a 90% increase in such attacks since 2016–that’s almost ten times the amount of attacks since 2016.
Read moreJuly 02, 2019
-
Articles
Malware in Digital Ads
Read moreJuly 01, 2019
-
Articles
Best Bank Account Cybersecurity Tips
Financial institutions and hacking go hand-in-hand these days and keeping your bank account and credit from being the next victim is more important than ever.
Read moreJune 27, 2019
-
Articles
Security Risk Assessment Tool: TraceSRA
Learn about the TraceSRA, a security risk assessment tool modeled after the HHS tool but with improved usability and enhanced feature sets.
Read moreJune 24, 2019
-
Articles
Understanding Integrity Controls
One of the many recommended practices in cybersecurity is to employ "integrity checking mechanisms" to verify software, firmware, and information integrity. As a cybersecurity consultant, clients often ask me for clarification, or in some cases, implementation guidance for this practice. This is not surprising given the many use cases and interpretations for integrity checking. And to make it worse, the answer can differ dramatically depending on the operating environment. Given these factors, I thought it might be helpful to "de-mystify" the subject of verifying software, firmware, and information integrity.
Read moreJune 24, 2019
-
Articles
Types of Penetration Testing
Read moreJune 03, 2019
-
Articles
The Phishing Phenomenon
How to keep your head above high water
Read moreMarch 11, 2019
-
Articles
Healthcare Industry Cyberattacks
The healthcare industry continues to get hit with relentless phishing and ransomware hacks.
Read moreFebruary 15, 2019