NIST 800-171 Compliance Can be Done Quickly!

NIST 800-171 Compliance actually means DFARS Cybersecurity requirements must be met. The NIST 800-171  requirements have always vexed small manufacturers due to the specific wordiness, so the NIST (National Institute of Standards and Technology) has been trying to make this easier to understand with the following pdf: https://nvlpubs.nist.gov/nistpubs/hb/2017/NIST.HB.162.pdf This is an important paragraph: from pdf Executive … Read more

Does Outsourcing Make You More Secure?

Outsourcing is good, since we cannot specialize in everything we can focus on sales or inventory instead of mundane tasks. So what is important and what is mundane? That depends on your business…  most businesses are not a software company, so obtaining software needs by outsourcing may be smart.  Then the question is should you … Read more

New Wi-Fi attack found on WPA2 using PMKID

This could make many “thought safe” Wi-Fi routers not so Here is where paying attention to new attacks is important. hashcat.net has the information: This attack does not even need a full EAPOL 4-way handshake,  EAPOL stands for Extensible Authentication Protocol(EAP) over LAN. A simple 4-way handshake is shown pictorially below  (from hitchhikersguidetolearning.com) This means that … Read more

Unknown Risks: Possible to Gauge?

Does the definition of unknown make measuring  risk also unknown? Let’s assume a cloud account has been created on Amazon Cloud(AWS – Amazon Web Services)  or elsewhere (Rackspace, Azure, or Google cloud) This cloud account will always be the Achilles heel of your Internet presence.  I.e. if someone gets a hold of he main account … Read more

Is There Cyber Risk? How to Assess Risk?

An interesting video from RSA Conference 2018: “There’s no such Thing as a Cyber-risk” So if you look at possible risk domains  Computer Security (or Cybersecurity is not on there. Operations: errors – fraud – talent – employee engagement – safety Service Availability: capacity, resiliency, data integrity, intentional disruption Product delivery: pre-executions – release executions … Read more