Posts

Defense-in-Depth is Key to a Successful Security Strategy

May 31, 2016

I was speaking to someone on the phone and asked a pointed question: “Are your systems hacked?” There was a pause, which I broke by saying that it was a very black and white question. His reply? “We’ve never been hacked.” My response? “How do you know?”

Read More »
cyber endpoints bkg

Another Day, Another Breach – Regaining Control of Your Network

May 25, 2016

Another day, another breach – and a long one at that for the latest FBI alert.  The FBI quietly released threat intelligence indicators, including web-based attack infrastructure, on a grouped labeled “APT6”, which has been actively pilfering data from multiple government networks since at least 2011.

Read More »