My Network: How Scared Should I Be?
How can I stay safe?
The only real solution is abstinence—don’t use the internet, don’t open emails, don’t let people in the building.
Sure, it won’t do much good if...
read more →The only real solution is abstinence—don’t use the internet, don’t open emails, don’t let people in the building.
Sure, it won’t do much good if...
read more →Mike Tyk is Novacoast’s Vice President of Security Services. He’s the man behind Novacoast’s Cybersecurity Advisory services, which is that bigger picture above integration, above training, above procedure. But zooming out that far can be confusing...
read more →Aaron Mog runs the Novacoast Threat Hunting practice. One of the newer strategies in protecting against breaches and vulnerability, Threat Hunting involves tracking down the malicious...
read more →
I recently found one of my personal username/password combinations in one of those published hacked password lists. My twitter...
read more →Remember when storage was cumbersome and expensive with crazy vendor lock-in? Okay, that's a rhetorical question since most organizations are still stuck with it. But really, no one has to be. Software Defined Storage solutions, based on open source...
read more →The casino industry is more than just gambling these days. I saw a change happening when I was CISO for Caesars Entertainment, and I’ve seen it continue as I’ve worked to secure networks across the industry. Following the wide...
read more →Once again, The Identity Theft Resource Center has released its cross-industry report of vulnerabilities, attacks and breaches. And the numbers paint a grim picture for the Healthcare Industry—whose breaches are increasing in frequency and cost.
read more →Every organization has privileged accounts. If you use computers, you have privileged accounts. When you install a server, you create a genesis account—the first account on the system and one that always has full access rights. And when you install...
read more →