cybersecurity
The Effects of #OpUSA
In the days leading up to #OpUSA, security professionals were busy making preparations for the supposed flood of new attacks coming on 7 May 2013. As we mentioned on 1 May 2013, publicly announced attacks of this nature can have highly volatile credibility. In some cases, the announcements exist onl…
Department of Labor Watering Hole Attack Confirmed to be 0-Day with Possible Advanced Reconnaissance Capabilities
Update 2 5/9/2013: Microsoft has released a “Microsoft fix it” as a temporary mitigation for this issue on systems which require IE8. At this time, multiple sites have been observed hosting pages which exploit this vulnerability. Users of IE8 who cannot update to IE9+ are urged to apply…
CVRF: A Penny For Your Thoughts
The Common Vulnerability Reporting Framework (CVRF) is a security automation standard intended to make your life easier by offering a common language to exchange traditional security and vulnerability bulletins, reports, and advisories. You can read more about it on the official ICASI CVRF 1.1 page,…
Accelerating Real World Cybersecurity Solutions Through Private-Public Partnerships
I had the pleasure of attending the inaugural signing of National Cybersecurity Excellence Partnership agreements yesterday. Key stakeholders in attendance included National Security Agency Director, General Keith Alexander, Senator Barbara Mikulski, Dr. Pat Gallagher of the National Institute of St…
I Can’t Keep Up with All These Cisco Security Advisories: Do I Have to Upgrade?
“A security advisory was just published! Should I hurry and upgrade all my Cisco devices now?” This is a question that I am being asked by customers on a regular basis. In fact, I am also asked why there are so many security vulnerability advisories. To start with the second question: Ci…
CyberPatriot Program Showcases Future of Cybersecurity Workforce
March 14 – 15 marked the National Finals Competition of CyberPatriot, the largest high school cyber defense competition in the United States. With students crowded around laptops, routers and clocks counting down, teams were given a business scenario. Told that they were newly hired IT professionals…
RSA 2013: That’s a Wrap
RSA 2013 ends and I both miss it and breathe a sigh of relief that it’s over. Let me explain. As a security guy, it’s nice to be around other security like-minded people. We all speak the language. You needn’t really justify why you are worried about things most people have never heard of. It’s exc…
RSA Conference 2013: I Am Security
Here I sit… In Mel’s Drive-In Diner, San Francisco, CA. I just inhaled the “El Ranchero Americano”, which I am sure to regret later, and am enjoying tunes from yester-year complete with Doo-Wop and Presley. You may ask, “Why do I care…?” Well, before this turns into an episode with Anthony Bourdain…
Mobile Telework: Cost Effective, Flexible and Secure
I really love my mobile devices, my iPhone, iPod, and rPod. What’s an rPoD you ask? It’s my mobile getaway vehicle. I can get access to mobile apps, listen to music, and enjoy a getaway to the coast. These devices are not just for fun though, these are powerful tools that allow me to tel…
5