Ransomware: The Culprit of the WannaCry Global Cybersecurity Storm

In an era where technology is integral to the way we interact with the world, to be locked out of one's data and digital devices has become one of mankind's greatest fears. Last Friday, May 12, we witnessed an immense wave of panic spread across the USA, Asia, and Europe, brought about by a

By |2017-05-22T16:45:04+00:00May 17th, 2017|Categories: Cyber Security|Tags: , , |

Air Force ‘Bug Bounty’ Calls For Hackers to Expose Cybersecurity Holes

The U.S. Air Force has announced that it is launching a "bug bounty" challenge from May 30 to June 23, allowing hackers to scan for cybersecurity vulnerabilities on its public-facing websites in exchange for cash rewards. The challenge, billed as "Hack the Air Force," is open to cybersecurity specialists and "white hat" hackers from

CyberSquad, Assemble! 5 Key Roles In Your Cybersecurity Team 

Cue the CyberSquad signal! Cyber threats are the super villains with a mission to destroy your organization, and it takes special abilities to bring them down. When it comes to cybersecurity, you not only need a robust infrastructure, but also a competent talent force behind it—a superhero squad dedicated to defending your organization from the

By |2017-06-07T19:49:47+00:00April 11th, 2017|Categories: Cyber Operations and Training, Cyber Security|Tags: |

Insider Threat Common Behaviors: Spotting the Wolf

Let us examine some of the most commonly identified patterns of Insider Threat traits and behaviors. These may seem like unsavory characteristics, but then Insider Threats are unsavory characters. Before we begin – a word of caution: Just because an individual displays one or more of these behaviors or traits does not necessarily mean

By |2017-03-28T12:48:59+00:00March 28th, 2017|Categories: Cyber Security, Insider Threat|Tags: , |

Ingredients for Cyber Dog Food [Video]

What is Cyber Dog Food? Cybersecurity is a watchdog that’s always on duty. As you may have read in our piece on Homeland Security Today, "you must be willing to apply the same standards to your company’s network as you would when making a recommendation to a client.” What are the ingredients of Cyber

By |2017-05-02T16:34:44+00:00October 25th, 2016|Categories: Cyber Operations and Training, Cyber Security|Tags: , |

Are You Password Protected? [Video]

Passwords: A Cheap Way to Improve Your Security Posture As a recently retired Naval Cyber Warrior, I come from a long line of salty and forward leaning communications and network security sea dog. My favorite sea dog was a Submarine Skipper who took over as the Battle Group N6 (meaning he owned all long

By |2017-04-06T14:14:27+00:00October 19th, 2016|Categories: Cyber Operations and Training, Cyber Security|Tags: , |
Go to Top