Tag: guest post

By: Daniel Marvin, March 16, 2017 (06:27 AM)

DFS Regulations Allow for Third-Party CISO

On March 1, 2017, the New York State Department of Financial Services (“DFS”) Cybersecurity Regulations (the “Regulations”) took effect. The Regulations, which are the first of their kind in the nation, require banks, insurance companies, mortgage brokers, lenders, and other institutions reg...

Continue Reading
By: Susan Morrow, March 14, 2017 (07:35 AM)

Is the Mirai Bot a Sign of The Times or Things to Come?

On 21, October 2016, arguably the most significant Internet cyber attack in history occurred. Big sites like Twitter and Netflix suddenly weren’t working. Dyn, who handle DNS routing for some of the world's best-known Internet companies, had been attack...

Continue Reading
By: Walker Rowe, March 13, 2017 (06:50 AM)

Wikileaks Vault 7 CIA Espionage Tools

The worldwide media has widely reported on the loss of the CIA cyber arsenal to WikiLeaks. WikiLeaks calls this trove Vault 7. But the media, and most readers, are not IT people. So the articles do not give an exact view as to exactly what has been lost by the CIA, as the average newspaper reader wi...

Continue Reading
By: Owen Dubiel, March 06, 2017 (10:03 AM)

OSINT Strategies, Resources and Results

The internet is a vast universe of information. Centuries of data that has accumulated for anyone to use if they can find it. Learning how to harvest this data using a few different strategies and resources to navigate the web is a skill that can be very valuable. Not only in the business world but ...

Continue Reading
By: Owen Dubiel, March 02, 2017 (10:24 AM)

Network Compromise Kill Chain

As a cyber security professional it is imperative that you fully understand the attack kill chain and how to stop it. In the long run it will be beneficial for any security analyst to have a plan of action in place for each step as well as having it memorized. In the event of a possible compromise, ...

Continue Reading
By: Walker Rowe, February 02, 2017 (11:05 AM)

Understanding Buffer Overflow and Shellcode Exploits

In the official biography of Bill Gates, Paul Allen, the Microsoft co-founder, tells of flying into an airport with the code he and Bill had sold to Atari to provide Basic Language for that platform. Mr Allen says as the airplane circled the airport he realized he had not written code to load those ...

Continue Reading
By: Walker Rowe, January 26, 2017 (09:40 AM)

Shodan: The Hacker’s Device Search Engine

There is a new tool on the internet that is nothing short of incredible: Shodan. It can be characterized as a search engine for hackers. But it does have legitimate uses, such as testing defenses and exposing vulnerabilities in one’s own network.What Shodan does is scan every ...

Continue Reading
By: Walker Rowe, January 19, 2017 (09:15 AM)

Grizzly Steppe: NSA Analysis of Russian Attack on the Democratic Party and Clinton Campaign

Here we discuss the December 29 NSA technical analysis JAR (Joint Analysis Report) of the Russian attack on the US election infrastructure.Russia BlamedAs anyone who has watched the American election knows, the US government has firmly pointed the finger at the Russian government for ...

Continue Reading

Be Informed. Stay One Step Ahead.

Sign up for our newsletter and stay up to date with the latest industry news, trends, and technologies