Blog

August 8, 2017

Top 5 Ways to Prevent Malware: a WannaCry Story

Unless you’ve been hiding under a rock since the May 12th, you’ve heard all about the WannaCry attack. This article is not another 3-month late opinion […]
August 2, 2017
Financial Cyber Security

The Finance Sector – Rhythm Section for the Drumbeat of Regulation

We’re not doing this cyber thing right (starting with the fact that we keep calling it “cyber”). Our threats are changing quickly, and what was once […]
June 19, 2017
Healthcare IT Big Squishy Middle

Health Sector Security and the “Big Squishy Middle”

Health Sector Security and the “Big Squishy Middle” We all worry about records disclosure, theft and extortion, and disruption of mission-critical services as the outcomes we’d […]
June 19, 2017
Top Ten Penetration Test Results

Purple Team: Your First Pentest Results (Top 10)

Back in 2014, when I worked as a Security Administrator at a tribal casino, I was in the position of defending against our very first penetration […]
June 14, 2017
What is Managed Detection and Response

What is Managed Detection and Response (MDR)?

What is MDR? Managed Detection and Response (MDR) is a managed cybersecurity service that detects intrusions, malware, and malicious activity in your network and assists in […]
June 9, 2017

Purple Team: About Beacons

As the Director of Offensive Security Services at Critical Informatics, it is my job to understand and emulate the adversaries that threaten our clients.  Adversary sophistication […]
May 19, 2017

You’re Secure Until Your Ticket is Punched

Today, just about everything you view on the Internet is designed to either manipulate your opinion (mostly to sell you something but also to sway your […]
May 16, 2017

Why Security Folks Want to Cry About WannaCry

On May 12th 2017, reports began surfacing that a virulent ransomware attack, which takes advantage of a number of known vulnerabilities in unpatched Microsoft Windows systems […]
May 12, 2017

Cohu 3960HD Camera Vulnerabilities

Vulnerabilities Summary The Cohu 3960HD Series cameras contain multiple vulnerabilities: directory listing, unauthenticated XMLRPC commands, arbitrary file upload and code execution, source code disclosure, failed session […]

Want more cybersecurity information?

Sign Up for Our Daily Cyber Security News Blast