Your Boss comes to you and says “We need to be PCI DSS compliant by tomorrow and I’m assigning you as the compliance manager.” Your first thought might be, “what is PCI compliance?” or “why has god forsaken me?” Both are reasonable responses. But neither will get you...
Botnets and IoT – Our Future Internet of Dangerous Things A Dramatic Entrance In September of 2016, a botnet called Mirai facilitated a massive distributed denial of service attack on KrebsOnSecurity, a cybersecurity blog run by Brian Krebs. This...
Cybersecurity Compliance Companies are obligated to protect their sensitive or valuable data assets. These obligations manifest in the form of industry standards and legal regulations. The road to cybersecurity compliance can be overwhelming, but it is better to...
Network Logs In the rare (but not inevitable) event that your organization faces a security incident there will be a scramble for evidence. C-Suite executives, investors, regulators, and other stakeholders will want to know what was impacted, the scope of the...
What is OPSEC? Operational security (OPSEC) refers to the measures taken to conceal your Digital Footprints from a potential adversary. In other words, keeping secrets from bad guys. The term originates in US military history, and is often summed up in the adage...
The 8th Annual Billington CyberSecurity Summit. The Summit is an annual conference held in Washington DC. Attendees include cybersecurity professionals from both the private and public sectors. The agenda consists primarily of panel discussions where industry leaders...