Access and Feeds

Blog Archives

Cyber Hygiene: Seven Steps to Avoid Malware and Hackers

By Dick Weisinger

Cyberhygiene is the protection of access points for devices connected to a network. Appropriate security measures will monitor and protect computers, laptops, networks, printers, and operating systems from malware and other attacks that might attempt to breach security. Ali Dehghantanha,

Networking: Rearchitecting the Internet to Enable Trustworthiness and Verifiability

By Dick Weisinger

Networking has changed dramatically from the original days of TCP/IP and client-server and client-client interactions. New technologies like the Internet of Things (IoT), Cloud Computing, and Edge Computing have changed the amount, frequency and type of data being transmitted over

Security Debt: Consistent Vigilance is Needed to Reduce Number of Security Flaws

By Dick Weisinger

“Security Debt” is the build up of security flaws over time. The first release of an application may contain security flaws that were not addressed. Each subsequent release of the application may add new flaws without correcting the previous ones,

Security: Recalibrating how the Risks and Costs of Cyber Breaches are Estimated

By Dick Weisinger

Evaluating the risks and costs involved in security breaches may not follow the common rule-of-thumb calculations that are now commonly performed. Ponemon and IBM have published an annual report that estimates the costs inflicted on businesses that suffer data breaches.

Security: Hacking Cases Spike Amid Pandemic Confusion

By Dick Weisinger

As workers stay home and access corporate systems remotely, a spike in hacking and security breaches is being reported. VMWare Carbon Black reports that ransomware attacks surged 148 percent in March over the levels in February. Tom Kellermann, VMware cybersecurity