Industry responds to cybersecurity framework

In August, NIST requested feedback from the owners and operators of the nation's critical infrastructure to understand how the Framework for Improving Critical Infrastructure Cybersecurity was being used and how it could be improved. Most of the responses posted by NIST were not from organizations running the infrastructure, but tech companies and industry associations. The [...]

Despite security fears, IT execs forecast more cloud

Despite more than three-quarters of businesses in the US adopting cloud storage and web applications, and 70 percent globally, confidence around cloud security is at an all-time low according to a recent survey by BT. The survey revealed that security is the main concern about using cloud-based services. About half of respondents stated that they [...]

An awareness month you should celebrate all year

In the month dedicated to more awareness topics than any other, you won't want to miss out on National Cyber Security Awareness Month (NCSAM). While you won't likely see sporting events with athletes sporting uniform accessories with neon green of NCSAM's logo (well, maybe the Seahawks...), you might be surprised to know that this year [...]

Infographic: Continuous monitoring key for federal cybersecurity

In response to the 2013 Executive Order 13636 on Improving Critical Infrastructure Cybersecurity, the framework published in 2014 by NIST addresses improving resilience to cyber incidents and reducing cyber threats. While one solution can’t fit all, a core component of the framework is continuous monitoring. Scroll through the infographic below to see why continuous monitoring [...]

Finding successful tech solutions for DoD

Maj. Gen. Brett Williams is the director of operations at the US Cyber Command. He recently wrote an opinion piece entitled, "Why too many technology solutions fall short." His assertion is that solutions fail because it's tough to balance the risk across the three stakeholder groups, essentially those: 1) controlling the money, 2) responsible for operating [...]

Cisco, health care reports show no industry is safe

Data breaches clearly aren't limited to retailers like Target. Cisco's annual security report predicts "unprecedented growth" for more and more advanced attacks coming in 2014. Mobile devices are clear targets, with about 99 percent of mobile malware affecting the Android platform. The behavior of mobile users tends to be less guarded, leaving devices with [...]

Cybersecurity Framework released in the calm before the storm

A day before another winter storm shut down Washington DC with up to a foot of snow, the National Institute of Standards and Technology released the first version of a long-awaited cybersecurity framework. The report follows several recent cyber-attacks that compromised more than 100 million customer records from major retailers. The framework was billed in [...]

Assume that you are a Target

There has been a buzz in the Uplogix office about the much-publicized Target credit card information breach. No, not just because many of us are now carrying shiny new credit cards proactively replaced by our banks due to our vulnerability as frequent Targét (say it Tar-zhay) shoppers, but because initial reports indicated that the breach relied [...]

Locking down long-time vulnerabilities

Don't worry -- National Cybersecurity Awareness Month isn't until October, you still have many months to plan that perfect awareness event. But this month we're going to focus on the security topic because you need to be aware of security every month. Today we're going to talk about two forms of critical security vulnerabilities continue [...]

M2M Management Case Study: ATMs

Increasingly, automated teller machines are the “brick and mortar” point of contact for customers with their bank. For decades, these M2M systems have been popular with customers and increasingly reliable as the technology has advanced, but also complicated and expensive to support. One Uplogix customer has an aggressive plan to deploy ATMs and chose to [...]