70 Percent of Energy Security Pros Fear Digital Attacks Could Produce a “Catastrophic Failure”

Digital attackers are targeting organizations in the energy sector like never before. For example, just a few weeks ago, the FBI and Department of Homeland Security issued a joint report describing a massive Russian hacking campaign to infiltrate … Continue reading 70 Percent of Energy Security Pros Fear Digital Attacks Could Produce a “Catastrophic Failure”

How the Rise of Cryptocurrencies Is Shaping the Cyber Crime Landscape: Blockchain Infrastructure Use

Introduction
Cyber criminals have always been attracted to cryptocurrencies
because it provides a certain level of anonymity and can be easily
monetized. This interest has increased in recent years, stemming far
beyond the desire to simply use cr… Continue reading How the Rise of Cryptocurrencies Is Shaping the Cyber Crime Landscape:
Blockchain Infrastructure Use

Analyzing Oracle Security – Critical Patch Update for April 2018

Today Oracle has released its quarterly patch update. Oracle warns that if customers fail to apply available patches, attackers become successful in their attempts to maliciously exploit vulnerabilities. April’s CPU fixes a total of 254 security … Continue reading Analyzing Oracle Security – Critical Patch Update for April 2018

Unified Access Management for Cloud Servers

A new marketing term is being thrown about in the identity and access management space. To many IT admins it is unclear what this term means and what it covers. This new key term is called unified access management, and many can’t help but wonder… Continue reading Unified Access Management for Cloud Servers

From my Gartner Blog – Threat Simulation Open Source Projects

It’s crazy how many (free!) OSS projects are popping up for threat and attack simulation! We are working on research about Breach and Attack Simulation (BAS) tools, and we’ll certainly mention these projects, buy I thought it would be valua… Continue reading From my Gartner Blog – Threat Simulation Open Source Projects

Defining RPO and RTO in the Age of Cloud Computing

One of the best practices in well run IT organizations is for CIOs and IT managers to evaluate the risk of data loss, and establish business continuity plans that outline backup and recovery along with their respective Recovery Point Objectives (RPOs) … Continue reading Defining RPO and RTO in the Age of Cloud Computing

Beware of watering hole attacks!

Hackers have plenty of ways to breach your systems. They can use complex programs to exploit software bugs, send emails to dupe you into downloading malware, or insert a malware-infected USB drive directly into your computer. However, another increasi… Continue reading Beware of watering hole attacks!

RSA 2018 – Panic

While I wandered through RSA today, a song came to mind. You might recognize it, especially if you wore a lot of black clothes in the 1980s.  Its Panic. RSA 2018 is all about panic. Enjoy my new lyrics to this Smiths song. Panic on the streets of … Continue reading RSA 2018 – Panic