security
Securing Critical Internet Infrastructure: an RPKI case study in Ecuador
Securing the Critical Internet Infrastructure is an ongoing challenge for operators that require collaboration across administrative boundaries. Last September something exceptional happened in Ecuador, a small South American country. The entire local network operation community got together to be p…
New Research Examines Impact of Cyber Insecurity on Country’s GDP Growth
I’ve been in Australia this week visiting customers, speaking at conferences, and meeting with peers and colleagues in the security space. With Australia poised to take the G20 leader’s chair in just over two weeks (December 1, to be specific), my visit here could not have been better timed. On this…
8 of 9 HIPAA Network Considerations
Discovering a breach where ePHI has been stolen certainly falls into the ‘not a good day at work’ category. It can be catastrophic for some, especially if the compromise occurred months ago and wasn’t detected. Or if a 3rd party discovered the breach for you, which occurs more often than we think,…
Cybersecurity: Where are the Biggest Threats?
Rarely a week goes by that we don’t hear of a database compromise that results in confidential data—many times consisting of personally identifiable information (PII)—falling into the hands of those who should not have access to the data. Protection of our PII is becoming increasingly critical as m…
STEM Education Must be a Hands-on Approach
Science, technology, engineering and math (STEM) fields are critical to innovation and the continued development of the U.S. economy. However, trends are showing that while there are and will continue to be plenty of jobs in these fields, many students are unprepared or lack the desire necessary for…
Secure BYOD for Midsize Businesses
The Internet of Everything will connect 50 billion things by 2020. Your midsize business needs to stay ahead of potential security risks. Are you ready? Previously, I wrote about the importance of driving success for midsize businesses. Today I am focusing on security and BYOD for midsize companies…
7 of 9 HIPAA Network Considerations
The HIPAA Omnibus Final Rule is now in effect and audits will continue in 2014. At the HIMSS Privacy and Security Forum in Boston on Sept. 23, Leon Rodriguez, director of the Department of Health and Human Services’ Office for Civil Rights said to those who are wondering how the new rule will…
Massive Increase in Reconnaissance Activity – Precursor to Attack?
Update 2013-11-12: Watch our youtube discussion Update 2013-11-05: Upon further examination of the traffic we can confirm that a large percentage is destined for TCP port 445. This is indicative of someone looking for nodes running SMB/DCERPC. With that in mind it is extremely likely someone is look…
Using a “Playbook” Model to Organize Your Information Security Monitoring Strategy
CSIRT, I have a project for you. We have a big network and we’re definitely getting hacked constantly. Your group needs to develop and implement security monitoring to get our malware and hacking problem under control. If you’ve been a security engineer for more than a few years,…