by Alan Deeter | Aug 20, 2017 | Best Practices, Executive Reading, Legal, Technical, Uncategorized
The IoT Cybersecurity Improvement Act of 2017 is well on its way to becoming law. With support of several members in both the House and Senate, plus many technology lobbying groups regularly relied on by Congress, odds are good it will be law by the end of the next...
by Alan Deeter | Apr 14, 2016 | Executive Reading, Expert Opinion, Threats
The average total cost to a company that suffers a data breach has risen to $3.79 million per instance — up 23 percent over last year — according to the latest study by IBM and the Ponemon Institute. Lost business resulting from reputation damage was cited as the most...
by Alan Deeter | Feb 18, 2016 | Case Studies, Executive Reading, Expert Opinion, SSH, Threats
Speaking at last week’s Security Analyst Summit in February 2016, Scott Erven, a medical device security advocate described how medical devices are putting hospital networks and patient data at risk. Erven reported that hundreds of hospitals, clinics, and health...
by Alan Deeter | Jan 22, 2016 | Executive Reading, Incidents, SSH, Technical, Threats |
Exactly 30 days after the announcement that Juniper Networks had jeopardized customer security by shipping products with a hard-coded SSH password, security appliance manufacturer Fortinet has announced that many of their products contain a similar hard-coded backdoor...
by Alan Deeter | Dec 22, 2015 | Executive Reading, Incidents, SSH, Threats, Uncategorized |
Juniper Networks announced last week that an internal code review revealed two critical security vulnerabilities in ScreenOS, the Linux derived operating system that powers approximately 26,000 Netscreen firewall devices on the internet today. The review uncovered two...
by Alan Deeter | Dec 9, 2015 | Best Practices, Executive Reading, Expert Opinion, SSH |
The SANS Institute reports “up to 80% of [IT security] breaches may originate in the supply chain, and they are making sure your customers know how to protect themselves — from you. In a recent white paper they describe best practices to protect your customers...