Articles
Network Attacks: The Who, What, Where and Why
As security practitioners, we generally see three types of perpetrators with different motives: Financial Political General trouble-making Each of these attackers can display various levels of organizational structure: Individual Well-organized, persistent group Ad-hoc groups pursuing a common pu…
Cyber Security Survival for the Holidays
A couple of days ago, I participated in a Social Video Broadcast about cyber security survival tips for the holiday season. Some of my advice is familiar. Use stronger passwords, apply the “smell test” to too-good-to-be-true on-line offers, read the manual—especially the parts about account set up a…
Live Broadcast: John N. Stewart to Discuss Cyber Security for the Holiday Season
The National Retail Federation predicts that Holiday Shopping this year will grow to $586.1 billion, with a record percentage of those purchases occurring online and from mobile devices. As more shoppers make purchases online and on their mobile devices, Cyber Monday is fast becoming Mobile Monday,…
Return of the DDoS Attack
One of the greatest threats to Internet service is Distributed Denial of Service (DDoS) attacks which can paralyze ISPs and disrupt traffic to and from targeted websites. For years now, DDoS attacks have dropped down the IT security priority list as topics such as IP theft took center stage. Recentl…