The Associated Press recently reported that email addresses of top DHS officials had been compromised as part of the massive SolarWinds hack. According to a DHS spokesperson, “a small number of employees’ accounts were targeted in the breach” and the agency “no longer sees indicators of compromise on our networks.” But what does that actually […]
Over a decade ago, security researchers at Microsoft identified a computer worm and dubbed it Ramnit. The malware family, “infects Windows executable files (.EXE) and HTML files (.HTML). It can also give a malicious hacker access to your PC. It spreads through infected removable drives, such as USB flash drives,” Microsoft warned. Fast forward to […]
Over the past year, the global pandemic has taught the cybersecurity industry a lot about the spread of infection–how to control it, how to mitigate against it, and (sometimes) how to detect it. But more often than not, in both humans and cybersecurity, detection only happens because of indicators. What remains a mystery and consequently […]
While many feel that they are living in Groundhog Day, the days and weeks do continue to pass us by, bringing the 2020 Presidential election closer with still no clear path for securing the election process. Recognizing the risks, the National Institute of Standards and Technology (NIST) published a document of risk management for election […]
With nation-state grade cyber warfare becoming the norm, CISOs need to expand their toolbox. A next gen solution might be the answer.