From the Summer 2022 Issue

Enterprise IoT is Currently Extremely Inadequate – But it Doesn’t Have To Be

Author(s):

Brian Contos, Chief Security Officer, Phosphorus Cybersecurity

The state of Internet of Things (IoT) security across the enterprise and government agencies is shockingly bad. IoT devices are highly vulnerable; therefore, making organizations vulnerable. In many ways enterprise IoT security today is like IT security in the early 1990’s with poor asset inventories, limited patching, and weak credentials, which is to say, enterprise … Read more

From the Summer 2022 Issue

Strategic Cyber Compliance

Author(s):

Mike Shelah, Business Performance Advisor, Insperity

Strategic Cyber Compliance

In March of 2022, after attending a day long cyber conference at the local community college in Carroll County, Maryland,  the featured Keynote speaker for lunch was a risk management specialist, and he shared a brief and powerful story that will now be shared with you. A good friend of his is CIO for a … Read more

From the Summer 2022 Issue

Ukraine is Winning the Cyberwar Against Russia

Author(s):

Alex Haynes, CISO , IBS Software

Ukraine is Winning - Alex Haynes

During the build-up to the illegal invasion of Ukraine in February of 2022, there was consternation among information security professionals about what would happen on the cyber front. The prevailing groupthink at the time was that if countries in the West imposed sanctions, then they would suddenly be subjected to blistering Russian cyber-attacks that would … Read more

From the Summer 2022 Issue

Cybersecurity in the Alamo City: A Global Industry Leader

Author(s):

Jeff Fair, VP, Cybersecurity & Economic Development, San Antonio Chamber of Commerce

Nathan Ramon, Program Assistant, San Antonio Chamber of Commerce

Alamo City

San Antonio has a long history of technological innovation, which has set the course for the city to remain a leader in the cybersecurity industry for decades to come. A contributing factor to the area’s unique success stems from a longstanding military presence, infusing the region with innovators and a trained and ready workforce. Because … Read more

From the Summer 2022 Issue

Using Behavior Profiling to Identify Insider Threats – Part 1

Author(s):

Richard Benack, Principal Investigator, Hiperformance Security

Benack-Su22-feature

INTRODUCTION Organizations often spend significant time, effort and resources protecting their data and systems from external threats such as hackers, foreign spies, hacktivists, and cybercriminals. Internal threats, often called “insider threats”, are often ignored because they are much more challenging for an organization to address. One valuable tool for managing risk around insider threats is … Read more

From the Summer 2022 Issue

Cybersecurity in Banking and Financial Services Industry: Main Threats, Requirements, and Recommendations

Author(s):

Veniamin Simonov, Director of Product Management, NAKIVO

Simonov-Su22-feature

Finance is in the top 3 industries most frequently attacked by hackers, and for a good reason. Banks collect, store, and process personal information to serve clients, which can easily be misused when in the wrong hands. Consequently, a single data breach or loss incident can cost tens of millions of dollars (the Equifax data … Read more

From the Spring 2022 Issue

Playing Offense and Defense with Drone Cybersecurity Threats

Author(s):

Kate Esprit, Cyber Threat Intelligence Analyst, MITRE

TBONE, Tesla, and Technological Threats In October 2016, U.S.-based vehicle manufacturer Tesla received some surprising news – two German security researchers had found a way to hack the company’s cars using a drone. The researchers, Ralf-Philipp Weinmann and Benedikt Schmotzle had hacked into Tesla’s systems by exploiting several zero-click vulnerabilities in the ConnMan software, an … Read more

From the Spring 2022 Issue

Human Risk in the Flow of Work

Author(s):

Travis Good, MD, Co-Founder and CEO, Haekka

The way in which work is performed has changed dramatically over the last 20 years. Digital transformation, coupled with the transition to remote work, has only accelerated over the last several years with the backdrop of Covid. Organizations today, large and small, have the herculean mandate of securing their biggest liability — remote workers and … Read more

From the Spring 2022 Issue

Getting Offensive With Your Third Parties

Author(s):

Alex Haynes, CISO , IBS Software

ah-sp22 Feature Image

Third-party onboarding today isn’t easy and with the rise in supply chain attacks, the importance of auditing and ensuring your third parties won’t impact your infrastructure from a security perspective remains a burning issue. Many companies still maintain a tick box approach when onboarding or managing third parties and mainly consist of sending out questionnaires … Read more