General

Home|General

VPNFilter Malware Mitigation

VPNFilter is a current malware designed to infect routers. As of 24 May 2018, it is estimated to infect approximately 500,000 to 1,000,000 routers worldwide. It can steal data, contains a "kill switch" designed to destroy the infected router on command, and is able to persist should the user reboot the router. The FBI [...]

By |June 6th, 2018|General|Comments Off on VPNFilter Malware Mitigation

What should you do about Facebook privacy

By Dr. Ulrich Lang, CEO The press is full of coverage of Facebook's privacy breaches. The sad part of the story is that many security and privacy professionals (including myself) have been working for years to create awareness and educate about the issues that are (if you would believe the press coverage) just coming [...]

By |April 13th, 2018|General|Comments Off on What should you do about Facebook privacy

Securing complex cyber-physical medical device landscapes

The Internet of Things (IoT) is the network of physical devices, vehicles, home appliances and other items embedded with electronics, software, sensors, actuators, and connectivity which enables these objects to connect and exchange data[i]. The IoT is going to be transformational – significantly impacting most industries and parts of society. Experts estimate that [...]

By |April 13th, 2018|General|Comments Off on Securing complex cyber-physical medical device landscapes

6 CyberSecurity Predictions for 2018

1. Increased adoption of risk-based and biometric authentication tools Anthem and Equifax breaches have raised some very serious questions on password-only authentication options. Service providers as well as consumers are now looking for alternatives that will reduce the risk of data breach. As risk-based authentication tools assess the background behavior and other data of [...]

By |January 12th, 2018|General|Comments Off on 6 CyberSecurity Predictions for 2018

Ransomware Attacks Healthcare Increased 89 Percent

The number of reported major IT/hacking events attributed to ransomware by health care institutions increased by 89 percent from 2016 to 2017, according to cyber defense firm Cryptonite’s 2017 Healthcare Cyber Research Report, which used data reported to the U.S. Department of Health and Human Services (HHS) Office for Civil Rights (OCR). The research [...]

By |January 11th, 2018|Cyber Security, From the web, General, Identity, IoT security|Comments Off on Ransomware Attacks Healthcare Increased 89 Percent

Week in CyberSecurity

What is wrong with CyberSecurity? According to an article in The Hill the new DHS breach illustrates perfectly what is wrong with today's cyber security practices. They say that "organizations should focus less on how a breach occurred (hacking, insider, fraud, etc.) and focus more on building up and preserving customer trust in their [...]

By |January 11th, 2018|General|Comments Off on Week in CyberSecurity

Protect yourself on public Wi-Fi networks

Firewalls come in many forms and often do not offer enough protection. In this blog post I describe a little project I've done to see how we can use a hardware firewall with Suricata based intrusion prevention in a somewhat portable way. Paranoid or necessary? I'd say necessary, considering the myriad of attacks that [...]

By |November 21st, 2017|Cyber Security, General, WiFi|Comments Off on Protect yourself on public Wi-Fi networks

Virtual Reality Support in OpenPMF

Walk virtually through your information flows. ObjectSecurity OpenPMF  now supports virtual reality and 3D (beta version).  OpenPMF 3D automatically creates a graph (nodes + edges) visualization of the imported information about your systems and applications alongside the "drag and drop" visualization that has been supported for several years.   [...]

By |October 20th, 2017|General|Comments Off on Virtual Reality Support in OpenPMF

Dynamic whitelisting and security policy automation.

Many Cybersecurity experts have said for years that we need to do better whitelisting, and that relying on blacklisting and anomaly detection is not good enough anymore. Unfortunately, organizations often cannot technically implement the comprehensive security policies they want to (or should want to). This is because there are too many overlapping technical configs [...]

By |August 14th, 2017|Company news, Conference, Events, General, San Diego|Comments Off on Dynamic whitelisting and security policy automation.

What is Security Policy Automation?

Today’s information age would have felt like out of a sci-fi movie to someone 20 years ago. More data has been created in the past two years than in the entire previous history of the human race. 1.7MB of data is created for every human per second. Within 4 years, we will have generated [...]

By |March 30th, 2017|ABAC, Access control, Education, General, IoT security, OpenPMF, PBAC, Security Policy Automation|Comments Off on What is Security Policy Automation?
Load More Posts