If You’re Breached, You May Be Facing Two Battles
According to an arstechnica article Monday, August 24, a federal appeals court ruled that the Federal Trade Commission (FTC) can now sue a company that
According to an arstechnica article Monday, August 24, a federal appeals court ruled that the Federal Trade Commission (FTC) can now sue a company that
My friend and mentor Billy Rios will be the instructor for the upcoming SANS Institute ICS/SCADA Security Essentials in Atlanta, September 28 thru October
Shodan Cataloging of Liebert & APC (Disclaimer – It is not the intent of this post to point out a particular BAS software vendor. The
And Other Scary Stats (Disclaimer – It is not the intent of this post to point out a particular BAS software vendor. The intent is
If you haven’t heard what Shodan is and why do we care, I would suggest you get familiar with it. Shodan has been called the “Google”
If you haven’t seen these maps, it can be eye opening. These are real-time and/or near real-time threat maps that are readily available online.
Dan Kaufman, head of the Software Innovation Division for DARPA (Defense Advanced Research Projects Agency) was asked a question by Lesley Stahl of 60 Minutes
Stromquist is pleased to now be a distributor for ZKAccess, manufacturers of security access equipment. As one of the largest providers in the world, they have
The list below is a continuation of the series Cyber Security Terms and Definitions. Some of the terms you may have heard or probably will
According to Wikipedia (in the midst of a donation drive), the origins of Cyber-attacks can be traced back to the first “hacking,” which took place