• img April 26, 2017

We Can’t Control Devices and People, but We Can Control the Network

For decades, consultants and federal systems integrators have served as a bridge between Silicon Valley and the U.S. Federal Government, offering a variety of products with a “mission-first” approach that directly addresses public sector needs. To learn more, I recently met with BAI Senior Director of Operations Ryan Morris to ask about current trends he […]

Read More
  • img April 14, 2017

Smart Cities Must Be Secure Cities

If you’ve never heard the term “smart city” before, you are soon going to be hearing it a lot. Smart city technology uses data sensors and analytics, the IoT, information and communication technology to improve the efficiency of city services and the quality of our lives. Smart cities monitor and manage physical assets, infrastructure, connectivity, […]

Read More
  • img April 13, 2017

Is Fileless Malware Really Fileless?

Reports of fileless malware infecting companies around the world have hit a new high, most recently attributed to a single group, FIN7. Besides residing in memory in order to remain nearly invisible, another aspect of fileless malware is the usage of widely deployed tools which systems administrators rely on, such as PowerShell. I wrote back […]

Read More
  • img April 13, 2017

What Is Your Security Canary?

At the turn of the 20th century, coal miners were in a tough spot – their livelihoods and the continued operation of their respective employers required work in dangerous conditions and where exposure to invisible toxic gasses killed large numbers of miners every year. Then, Scottish physiologist John Scott Haldane proposed the use of sentinel […]

Read More
  • img April 13, 2017

Ask a Security Pro: Encryption Explained

Over the last year I’ve led a multitude of security workshops aimed to educate entry-level WordPress users about website security. Some of the questions I regularly field in these workshops are related to the mechanics of SSL certificates, and their role in protecting website data from prying eyes. As you may know, the installation of […]

Read More