Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Blog

How to Initiate a Threat Hunting Program (Part 1)?

Over the past many years, cyber threats have become greater in frequency and more sophisticated than ever. Current security mechanisms are based on traditional reactive approaches such as antivirus programs and firewalls who react once the incident has occurred. Under such circumstances, intruders have a chance to compromise your network either partially or entirely.

Tribbles, Supply Chains and Industrial Cyber Security

In the original Star Trek episode “The Trouble with Tribbles,” an unscrupulous merchant, Cyrano Jones, gives a small furry animal called a Tribble to communications officer Uhura. Uhura takes the Tribble aboard the Starship Enterprise where the animal begins to quickly reproduce, thereby threatening to overrun the ship and cause significant damage.

Cybersecurity Challenges Facing Higher Education

With more colleges and universities incorporating Software-as-a-Service (SaaS) platforms to enable registrars, admissions, and financial aid offices, they are collecting more electronic student information. Couple that with weak networks and systems, and the state of cybersecurity in higher education earns an F. To remain solvent in an era of continued student recidivism, higher education needs to focus more efforts on protecting this information from cybercriminals.

A cyber security health check for the most vulnerable

Having covered the start-up vs corporate question before, we thought we would look into which industry is currently most at risk of cyber attack. According to the Wikipedia entry ‘list of data breaches’, which contains a list of data breaches (spoilers), out of 255 data breaches over the last 15 years, historically, the hardest hit industry was ‘web’.

Single Sign-On for Kubernetes: An Introduction

One of the great things about Kubernetes is that it completely separates authentication and authorization. Authentication (Authn) meaning the act of identifying who the user is and authorization (Authz) meaning the act of working out if they’re allowed to perform some action. This can be thought of in terms of a Passport and a Visa.

Getting Compliant and Staying Agile

Agile first began in the world of software development. It was used to break down larger complex projects into more manageable chunks. As a result, Agile focused on prioritizing tasks, identifying value, and achieving continuous improvement. Companies that can harness an Agile framework can significantly reduce production times and risk while improving the quality of their products.

Adventures of Cyber Security Monitoring During 2018 U.S. Midterm Elections

With all the Russian election hacking scandals in the news during and after the 2016 Presidential election, curiosity consumed me to architect and run an experiment to see if I could monitor changes in the threat landscape in either Moscow, Russia or Washington D.C. during the 2018 U.S. midterm elections.

Risk Management Process For Insurance Companies

Insurance companies know how to insure their clients’ homes, cars, and businesses, but they may find it difficult to ensure that the information they collect remains secure. While the insurance industry focuses on risk-based analyses for premiums, it needs to focus internally and use those same risk management processes for securing customer information.