NIST Updates Password Security Guidelines: $t0P d0!Ng Th!$

To those who think Th!$ i$ Th3 b3$t w4y t0 wr!t3 a P@$$w0rd, think again. The National Institute of Standards and Technology (NIST) has recently published new guidelines on password security, revising the old rules and deeming them counterproductive to personal security purposes. Paul Grassi, NIST Senior Standards and Technology Adviser, said in an

By | 2017-12-05T17:17:39+00:00 August 18th, 2017|Categories: Cyber Security|Tags: |

Report on Department of Defense IoT Devices Reveals Security Gaps

A report published by the Government Accountability Office (GAO) reveals that much improvement is required to strengthen security measures for IoT (Internet of Things) devices within the Department of Defense (DoD). The report, titled Internet of Things: Enhanced Assessments and Guidance Are Needed to Address Security Risks in DOD, outlines the existence of DoD

By | 2017-08-08T16:38:10+00:00 August 8th, 2017|Categories: Cyber Security|Tags: , |

Why U.S. Cyber Command is Reportedly Splitting From NSA

News that the United States Cyber Command is breaking off from the National Security Agency recently surfaced, with U.S. officials claiming the move as an effort to strengthen the country’s ability to conduct defensive and offensive cyber operations. According to various news sources, the goal of the reported separation is to make Cyber Command

By | 2017-07-27T19:33:45+00:00 July 27th, 2017|Categories: Cyber Operations and Training, Cyber Security|Tags: |

The Breakdown: Protecting Yourself from Ransomware

Imagine this: you come home from work, turn the key and slowly walk into your house. As you step in, your jaw drops as you see the horrifying emptiness of your home. No furniture, no things, no trace of anything you once had. Your chest tightens. Your heart races. Your

By | 2017-07-21T15:11:34+00:00 July 20th, 2017|Categories: Cyber Operations and Training, Cyber Security|Tags: , , |

Ransomware: The Culprit of the WannaCry Global Cybersecurity Storm

In an era where technology is integral to the way we interact with the world, to be locked out of one's data and digital devices has become one of mankind's greatest fears. Last Friday, May 12, we witnessed an immense wave of panic spread across the USA, Asia, and Europe, brought about by a

By | 2017-05-22T16:45:04+00:00 May 17th, 2017|Categories: Cyber Security|Tags: , , |

Air Force ‘Bug Bounty’ Calls For Hackers to Expose Cybersecurity Holes

The U.S. Air Force has announced that it is launching a "bug bounty" challenge from May 30 to June 23, allowing hackers to scan for cybersecurity vulnerabilities on its public-facing websites in exchange for cash rewards. The challenge, billed as "Hack the Air Force," is open to cybersecurity specialists and "white hat" hackers from

CyberSquad, Assemble! 5 Key Roles In Your Cybersecurity Team 

Cue the CyberSquad signal! Cyber threats are the super villains with a mission to destroy your organization, and it takes special abilities to bring them down. When it comes to cybersecurity, you not only need a robust infrastructure, but also a competent talent force behind it—a superhero squad dedicated to defending your organization from the

By | 2017-06-07T19:49:47+00:00 April 11th, 2017|Categories: Cyber Operations and Training, Cyber Security|Tags: |

Insider Threat Common Behaviors: Spotting the Wolf

Let us examine some of the most commonly identified patterns of Insider Threat traits and behaviors. These may seem like unsavory characteristics, but then Insider Threats are unsavory characters. Before we begin – a word of caution: Just because an individual displays one or more of these behaviors or traits does not necessarily mean

By | 2017-03-28T12:48:59+00:00 March 28th, 2017|Categories: Cyber Security, Insider Threat|Tags: , |

Ingredients for Cyber Dog Food [Video]

What is Cyber Dog Food? Cybersecurity is a watchdog that’s always on duty. As you may have read in our piece on Homeland Security Today, "you must be willing to apply the same standards to your company’s network as you would when making a recommendation to a client.” What are the ingredients of Cyber

By | 2017-05-02T16:34:44+00:00 October 25th, 2016|Categories: Cyber Operations and Training, Cyber Security|Tags: , |