Cybersecurity threats in 2016

By | December 7th, 2015|Blog|

December is a great time to look back on the year and look forward to what to expect in the new year. The McAfee Labs security team released their annual report about the cybersecurity threats to expect in the next five years. Unfortunately the news is that if you thought ransomware, data breaches and hacked Jeeps were [...]

Cyber security responsibilities: who owns it?

By | October 23rd, 2015|Blog|

The Stop. Think. Connect. campaign is five years old this year, and while it has achieved several of the goals it began with, much of the public's increased awareness of cyber security has been based on the increasingly alarming data breaches of large corporations and the government. Statistics from the campaign say that "Nearly two-thirds of the [...]

“Flavor of the day” network security

By | October 15th, 2015|Blog|

Network security is tough. Too often a new attack vector appears on the scene and vendors scramble to put out a product to counter it. Companies scramble to implement it. And the bad guys scramble to find a new attack vector and it all starts over again. After a few cycles, this can lead to [...]

FBI publishes examples of IoT risks

By | October 15th, 2015|Blog|

Tick-tock, tick-tock... with every passing day we're getting closer to those 50 billion devices that Cisco estimates will be connected to the Internet by 2020. In anticipation, security conversations around the Internet of Things (IoT) are heating up. At the September Gartner Security and Risk Management Summit,analysts said that companies need to consider a holistic [...]

The Dirty Dozen network security issues

By | September 9th, 2015|Blog|

Gartner's "Dirty Dozen," the most common and often overlooked issues found in network security, is based on more than 3,000 client interactions over the last year. How many of these worst practices do you have in your network? They say avoiding these practices and instigating both short and long term changes will improve security while [...]

Greater cybersecurity for satellite & SCADA

By | September 9th, 2015|Blog|

Two markets that rely on Uplogix out-of-band management are playing catch-up when it comes to network security compared to many other industries. It's not that satellite and SCADA networks don't care about security, it's just that for a long time they've been physically isolated from much of the danger. That time has definitely passed. The World [...]

Putting air bags in a 1965 Mustang?

By | June 22nd, 2015|Blog|

The new US CIO, Tony Scott addressed security concerns in federal IT, especially after the recent massive data breach at the Office of Personnel Management. He said the one of the biggest challenges is protecting old and outdated IT infrastructure systems, comparing it to trying to install air bags in a 1965 Ford Mustang. It's [...]

Breach report blames the usual suspects

By | April 17th, 2015|Uncategorized|

The annual Verizon data breach investigations report came out this week with findings that show that the biggest threats are not new or unknown, but the same vulnerabilities that have plagued IT for years. It's been said that the only difference between a problem and a solution is that people understand the solution. Maybe not [...]

Continuing concerns over industrial networks

By | April 10th, 2015|Uncategorized|

It's not a new topic, but SCADA and other industrial control networks continue to be integrated into IP networks and utilize old computing platforms (Windows XP) for management of the programmable logic controllers (PLCs) that actually control industrial equipment. There are a number of well-known espionage examples of PLCs being exploited with malware, like the [...]

Does cybersecurity start in the corner office?

By | March 24th, 2015|Uncategorized|

While the buck stops at the CEO's desk, are they really the ones who should be driving corporate cybersecurity? Today, since the damage caused by a cyber breach rivals that of a terrible business decision, it only makes sense that the c-suite should be fully invested in corporate cybersecurity. The only thing that's keeping pace [...]