• img June 07, 2017

You Can't Hire Your Way Out Of The Skills Shortage… Period.

Training alone can’t close the cybersecurity skills gap. It’s just math. A major component of President Trump’s recent executive order on cybersecurity (see Sec. 3, Part D) calls for “workforce development” as part of strengthening the nation’s overall cybersecurity posture. While there has been some optimism around the potential for closing the massive cybersecurity skills […]

Read More
  • img June 07, 2017

You Can't Hire Your Way Out Of The Skills Shortage… Period.

Training alone can’t close the cybersecurity skills gap. It’s just math. A major component of President Trump’s recent executive order on cybersecurity (see Sec. 3, Part D) calls for “workforce development” as part of strengthening the nation’s overall cybersecurity posture. While there has been some optimism around the potential for closing the massive cybersecurity skills […]

Read More
  • img June 06, 2017

Social Security Administration’s Second Attempt at 2FA Fails Federal Government’s Own Standards, Not Secure

The Social Security Administration (SSA) recently instituted its latest precautions to identify threats and protect citizens’ information by making two-factor authentication mandatory for all users. This basic security layer is invariably better than nothing, but it places the burden on the customer to ensure their account is secure, while the organization should ultimately be responsible […]

Read More
  • img June 06, 2017

Following the Money Hobbled vDOS Attack-for-Hire Service

A new report proves the value of following the money in the fight against dodgy cybercrime services known as “booters” or “stressers” — virtual hired muscle that can be rented to knock nearly any website offline. Last fall, two 18-year-old Israeli men were arrested for allegedly running vDOS, perhaps the most successful booter service of all time. The […]

Read More
  • img June 02, 2017

WannaCry and Jaff: Two Different Malware Attacks with A Common Goal

On Friday, May 12, the Infoblox Intelligence Unit observed not one but two separate ransomware attacks — both using different distribution capabilities and malware. While the two ransomware attacks were not related, it’s becoming evident that the rise in this form of malware is growing exponentially, creating a greater need for businesses to double down […]

Read More