The Government Accountability Office outlined many information security vulnerabilities the FAA faces and could be putting everyone in danger.
Data Security
Hackers: The Internet’s Immune System
Most experts will argue that hacking has an integral role in the health of our Internet security, and that without it, information security will suffer.
Enterprise Security: Are Your Partners Secure?
Forming strategic business partnerships is essential for success in many industries today, but companies dedicated to tight security may be exposed to compromise if the deal is formed without discussing best security practices.
Tax Season Calls for Best Practices in Enterprise Security
Employers must use best security practices during tax season in order to make personal data less susceptible to attack.
DDoS Attacks: Have a Plan
DDoS attacks are difficult to prepare for, but that doesn’t mean you should sit and wait for them. Make a plan and stick to it to minimize the impact.
IoT Security: When Fiction Becomes Reality – Part II
In a follow-up to my last post, I’d like to address how infosec professionals can help non-security folks understand the need for security basics.
Private Internet 101
Private Internet is one way users can protect their data and avoid the flood of marketing campaigns enabled by tracking cookies. This beginner’s guide helps you know where to start and who to trust.
FREAK Attack: What You Need to Know
The FREAK attack does not affect SSL Certificates, but admins should disable export-grade ciphers on all servers. Users should install patches for their browsers as they become available.
IoT Security: When Fiction Becomes Reality – Part I
It’s up to the infosec community to reach out to engineering and manufacturing and to help them understand security risks and best practices. We need to engage in conversation. We need to gain a seat at the table so that security is not an afterthought in the era of connectivity.