cybersecurity
Protecting Our Networks: It’s a Team Game Now!
I have been coaching youth sports for the past seven plus years now and one of my common mantras when speaking to the girls and boys each season is that “we will win as a team and lose as a team.” In other words, I will never tolerate one player acting selfishly enough to think he or she is above e…
Security Assessments: More Than Meets the Eye
Is the product safe to use? I have been asked this question on occasion in a non-technical sense and maybe you have too. In a technical context, I could frame the question as “Are the online services and underlying technologies supporting my services safe?” A continuous effort must go into substant…
Network Attacks: The Who, What, Where and Why
As security practitioners, we generally see three types of perpetrators with different motives: Financial Political General trouble-making Each of these attackers can display various levels of organizational structure: Individual Well-organized, persistent group Ad-hoc groups pursuing a common pu…
Live Broadcast: John N. Stewart to Discuss Cyber Security for the Holiday Season
The National Retail Federation predicts that Holiday Shopping this year will grow to $586.1 billion, with a record percentage of those purchases occurring online and from mobile devices. As more shoppers make purchases online and on their mobile devices, Cyber Monday is fast becoming Mobile Monday,…
The Role of Common Criteria in Cyber Security
Today more than ever, networks are transforming the way organizations operate and are touching more people through a wider range of devices than ever before. Achieving a secure infrastructure is increasingly complex with today’s mobility, collaboration and cloud services added to the mix. These new…
Return of the DDoS Attack
One of the greatest threats to Internet service is Distributed Denial of Service (DDoS) attacks which can paralyze ISPs and disrupt traffic to and from targeted websites. For years now, DDoS attacks have dropped down the IT security priority list as topics such as IP theft took center stage. Recentl…
2