The information security space is one of the most volatile and unpredictable industries in existence. This isn’t hyperbole. Swarms of new, sophisticated threats emerge each day, and in just the first half of 2018, fewer than 1,000 breaches racked up more than 4.5 billion compromised data records. All it takes is one data breach to sink a business for good. In response, … [Read more...]
Why Government Vulnerability Disclosure Processes Need Private Sector Involvement
Most people are either staunchly for or against the practice of governments finding and concealing zero-day exploits for use in cyber warfare or information gathering campaigns. What’s often overlooked, though, are perspectives that this issue can be a lot more gray than it is black and white. Did you know that the US government actually has a process in place to assess both … [Read more...]
BGP Hijacking In a Nutshell
Recent news of BGP hijacks shows attackers are increasingly using this attack method. In WatchGuard’s 2019 security predictions, we predicted that a BGP exploit could take down substantial portions of the internet this year. But how could this happen? If you are unfamiliar with BGP it might make it hard to understand how someone could accidentally send traffic to one location … [Read more...]
The Top Cyber Threats Businesses Face Today
As 2018 comes to a close and we look ahead toward the new year, now is the time for reflection and planning. And for businesses of all sizes and industries, cyber security should be a major topic of discussion through this process. When it comes to information security, there isn’t a company out there that can afford not to ask the tough questions. When was the last time you … [Read more...]
Understanding the Layers of a Computer System
In order to attempt to exploit a system’s vulnerabilities it is important to understand the levels to which a computer or electronic system is built upon. There are many ways to depict the layers that make up electronic devices but the point that I will try to get across remains the same – that there are different layers to the overall design that certain parties are … [Read more...]