Posts Tagged ‘cybersecurity’

5G

5G Is Here, and It’s Time to Increase Your Cybersecurity Posture

5G is changing the face of communication and connection. According to Forbes, the technological innovations from 5G could contribute as much as $2.2 trillion to the global economy over the next 15 years. The service will revolutionize the amount of data collection and increasing the number of connected devices and sensors. With the rapid growth […]

Creating a Data Flow Diagram

A data flow diagram (DFD) documents the path data takes throughout your process/system. It is important to document and keep accurate and updated. Part of the value of such a diagram is that it shows where data is crossing a trust boundary. For example, user input (low trust) from a web site crosses a boundary […]

The Need for a National Health Record

In healthcare, which is more important privacy or safety? Are they mutually exclusive? In the leaps that we have made in cybersecurity in healthcare, can’t we have both? The main argument I hear against a National Health Record is people’s fear of a data breach. Contrary to that popular belief, one study, related to sharing […]

Application security assessment

How To Use The AWS API With S3 Buckets In Your Pen Test

Pen testers often need to stage payloads and other tools on servers outside of their own infrastructure.  In this post I’ll show you how to use the Amazon AWS command line interface (CLI) to dynamically create and manage S3 buckets that you can use in your own pen tests.  I’ll also show you how to […]

Ransomware Attack Affects 23 Texas Local Government Agencies

In what appears as a highly coordinated attack by a single actor, 23 local government agencies in the state of Texas were hit with ransomware. This extends the recent trend where local government entities were targeted, some of which have led to the attackers being paid millions of dollars via crypto-currency. A first line of […]

password manager

Here’s Why You Should be Using a Password Manager

I do not mean a notebook with handwritten passwords or even a spreadsheet.  I mean software designed specifically to generate and safely store your passwords.  We have all heard about sticky notes under the keyboard, or even worse on the monitor.  The current browsers can store your passwords for you and, assuming you have an […]

6 Reasons to Use Azure Active Directory

Azure Active Directory, commonly known as Azure AD, is “Microsoft’s cloud-based identity and access management service.1” It is a widely used IDaaS (identity and access management-as-a-service) that can integrate with an existing (or new) MVC-style web application, Web API, mobile app, and more to provide quick and easy authentication. I am no salesman (although it […]

COVID-19

IoMT and the Necessity for Cybersecurity

Cyber-security: a continuous mission to supervise, support, and evolve data protection. Healthcare providers remain aware and proactive in regards to cyber-attacks or malware that feature threats to patient records, and internal documents. By continuously remaining alert, healthcare organizations can confirm their IoMT networks are secure. What is Internet of Medical Things (IoMT)? IoMT features a […]

How Microsoft Word “Protected View” Stops Information Leaks

Microsoft Word has long offered support for loading images and templates over the network.  This is a great feature within corporate environments because it facilitates the reuse of assets like logos and corporate document templates.  Unfortunately, these features can be abused by bad actors to obtain operational intelligence on individuals, or even to steal credentials.  […]

10 Challenges Facing Medical Device Cybersecurity

Connected medical devices promise value for patients and physicians, but the devices also present new cybersecurity exposures that could put patients and their information at risk. The ECRI Institute, known for evaluating medical device cybersecurity, has developed a list of 10 problems facing medical device cybersecurity. These 10 key issues have the potential to be […]

Marketing and IT: A Team Effort in Cybersecurity

No matter how hard we try, it’s nearly impossible to keep our inbox free from junk mail and phishing threats. This is an annoyance for us, but for organizations, security threats pose a serious risk.  The looming threats facing businesses push them to constantly seek new technology in hopes of solving these issues. As technology improves, other organizational […]

Setup and Basic Preparation for Sitecore 9 Installation

Why Cybersecurity is Important to Marketers – Not Just IT

The Responsibility is Shifting When Adobe and Microsoft announced their partnership – and that Microsoft Azure is the preferred platform for hosting Adobe Marketing Cloud – the line between marketing and IT became even more blurred. The crossover between marketing technology and IT is not new, but it is continuing to increase year-on-year with no […]

Load More