Cyber Security Insight

The impact of a compromised IT infrastructure extends far beyond an organization’s internal mechanisms and functions. Data breaches and security incidents increasingly put not just individual companies but also entire supply chains at risk. When it comes to cyber security and cyber attacks, the topic...

Nobody likes eavesdroppers, ESPECIALLY when the eavesdroppers are state-sponsored hackers, quite possibly from your own government.  While officially unconfirmed, the discovery of backdoors in Juniper’s ScreenOS, correlated with what we know about some of the NSA’s digital interdiction methods, indicate that they might have been...

Sadly, yet another large corporation has been hit with a cyber attack. Back in December Hyatt Hotels discovered a data breach had occurred after malware targeted their payment processing systems. At the time Hyatt couldn’t provide much information about the breach as it was just discovering...

This past week, privacy and consumer security issues took center stage at the Consumer Electronics Show in Las Vegas, NV. Federal Trade Commission Chairwoman Edith Ramirez spoke with attendees about the potential benefits and risks associated with Big Data and the Internet of Things (IoT). Smart...

Online breaches have become a significant part of the discussion when it comes to protecting consumer and organization data across multiple industries - from government groups to private companies and beyond, it seems like no one is safe from prying, anonymous hackers stationed around the world. We...

It hasn’t been a great start to the new year for taxi and private car service, Uber. On New Year’s Day the company took heat over the ‘surge charges’ it imposed on New Year’s Eve – increased pricing during times of high demand on the service. Many...

The New Year is upon us. We’ve shaken off the food comas and hangovers, changed out of our pajamas and back into our big kid clothes and pinned a new calendar to the wall. Many of us see a new year as a fresh start,...

Emerging Threat - Juniper ScreenOS Backdoor An advisory has been issued that unauthorized code in the ScreenOS software that powers Juniper's NetScreen firewalls has been discovered. There are two distinct issues: a backdoor in the VPN implementation that allows a passive eavesdropper to decrypt traffic and a second backdoor...

The topic of cybersecurity was scalding hot this past year. It was debated by politicians, observed critically and thoughtfully by businesses worldwide, and misunderstood by countless consumers. From a technological standpoint, the breakthroughs that have occurred over the last few years are absolutely astounding. Our lives as human...

2015 is coming to a close. We’ve seen a lot this past year in the world of technology. 3D printing is breaking new ground, the Internet of Things is connecting our devices like never before, and cyber security is reaching a boiling point; so much...