More Sophisticated Attacks = We Must UP CyberSecurity
This is the problem in all of these stories – somehow the client computer was infected. (how can we stop it in the best manner possible)? There are plenty of…
Is Your Cyber Risk Manageable?
Have you done everything you could to manage the level of risk that you need to have? On Feb 4th I said Risk Management failed us: http://oversitesentry.com/risk-management-does-not-work/ So how can…
Block All Traffic From China improves your Defense
What if you could block all China originating traffic? As you see there was a Forbes Internet attack survey done for Q2 2014. China was the top source of attack…
Federal Laws May Affect Cybersecurity Legal
Security Magazine has the story: http://www.securitymagazine.com/articles/86057-understanding-the-new-federal-cyber-laws The CEA(Cybersecurity Enhancement Act 2014) is the most significant of the December bills both in breadth and likely in significance. Where NIST(National Institute of…
Vulnerabilities Can Be Exploited
(Sunday reflections and current news) Specifically the Seagate NAS Business Storage Line Today’s Internet Storm Center has the story. This is the method the attackers can use to hack the…
