Insider Threat Awareness Month: How to Build Resilience

Resilience: The capacity to recover quickly from difficulties; toughness. Resilience is a word that has been used often during the year 2020. It’s meaning has been shared in our homes, on advertisements, in public service announcements, and throughout companies' internal communications. The month of September is Insider Threat Awareness Month — a month to

By | 2020-09-03T15:16:42+00:00 September 3rd, 2020|Categories: Cyber Security, Insider Threat|Tags: |

13 Cybersecurity Best Practices You Should Apply in 2020

When we think of the start of the new year, we usually think of goals, but maybe instead of focusing on just personal goals, we can shift our focus to workplace goals. Having a list of goals written down makes you 10 times more likely to accomplish said goals. So, we’ve put together a

By | 2020-06-05T23:59:45+00:00 February 21st, 2020|Categories: Cyber Security|

NIST Updates Password Security Guidelines: $t0P d0!Ng Th!$

To those who think Th!$ i$ Th3 b3$t w4y t0 wr!t3 a P@$$w0rd, think again. The National Institute of Standards and Technology (NIST) has recently published new guidelines on password security, revising the old rules and deeming them counterproductive to personal security purposes. Paul Grassi, NIST Senior Standards and Technology Adviser, said in an

By | 2017-12-05T17:17:39+00:00 August 18th, 2017|Categories: Cyber Security|Tags: |

Report on Department of Defense IoT Devices Reveals Security Gaps

A report published by the Government Accountability Office (GAO) reveals that much improvement is required to strengthen security measures for IoT (Internet of Things) devices within the Department of Defense (DoD). The report, titled Internet of Things: Enhanced Assessments and Guidance Are Needed to Address Security Risks in DOD, outlines the existence of DoD

By | 2017-08-08T16:38:10+00:00 August 8th, 2017|Categories: Cyber Security|Tags: , |

Why U.S. Cyber Command is Reportedly Splitting From NSA

News that the United States Cyber Command is breaking off from the National Security Agency recently surfaced, with U.S. officials claiming the move as an effort to strengthen the country’s ability to conduct defensive and offensive cyber operations. According to various news sources, the goal of the reported separation is to make Cyber Command

By | 2017-07-27T19:33:45+00:00 July 27th, 2017|Categories: Cyber Operations and Training, Cyber Security|Tags: |

The Breakdown: Protecting Yourself from Ransomware

Imagine this: you come home from work, turn the key and slowly walk into your house. As you step in, your jaw drops as you see the horrifying emptiness of your home. No furniture, no things, no trace of anything you once had. Your chest tightens. Your heart races. Your

By | 2017-07-21T15:11:34+00:00 July 20th, 2017|Categories: Cyber Operations and Training, Cyber Security|Tags: , , |

Ransomware: The Culprit of the WannaCry Global Cybersecurity Storm

In an era where technology is integral to the way we interact with the world, to be locked out of one's data and digital devices has become one of mankind's greatest fears. Last Friday, May 12, we witnessed an immense wave of panic spread across the USA, Asia, and Europe, brought about by a

By | 2017-05-22T16:45:04+00:00 May 17th, 2017|Categories: Cyber Security|Tags: , , |

Air Force ‘Bug Bounty’ Calls For Hackers to Expose Cybersecurity Holes

The U.S. Air Force has announced that it is launching a "bug bounty" challenge from May 30 to June 23, allowing hackers to scan for cybersecurity vulnerabilities on its public-facing websites in exchange for cash rewards. The challenge, billed as "Hack the Air Force," is open to cybersecurity specialists and "white hat" hackers from

CyberSquad, Assemble! 5 Key Roles In Your Cybersecurity Team 

Cue the CyberSquad signal! Cyber threats are the super villains with a mission to destroy your organization, and it takes special abilities to bring them down. When it comes to cybersecurity, you not only need a robust infrastructure, but also a competent talent force behind it—a superhero squad dedicated to defending your organization from the

By | 2017-06-07T19:49:47+00:00 April 11th, 2017|Categories: Cyber Operations and Training, Cyber Security|Tags: |

Insider Threat Common Behaviors: Spotting the Wolf

Let us examine some of the most commonly identified patterns of Insider Threat traits and behaviors. These may seem like unsavory characteristics, but then Insider Threats are unsavory characters. Before we begin – a word of caution: Just because an individual displays one or more of these behaviors or traits does not necessarily mean

By | 2017-03-28T12:48:59+00:00 March 28th, 2017|Categories: Cyber Security, Insider Threat|Tags: , |