DoS, DDos and DeOS… Oh My!!

In the security industry, we classify our security infrastructure in a variety of ways. One important classification method is called the “CIA Triad,” which refers to three security objectives defined by the Federal Information Security Management Act (FISMA). These three objectives are Confidentiality, Integrity and Availability. The goal of any information security team is to protect against these three objectives, and the goal of an attacker is to compromise one or more of these objectives.

Read more

Emily, Ernie, and the Fleecing of a Company

This is the first post in a series examining how information is lost or stolen and how business owners and/or their employees may be the greatest risk to the business. If you are a business owner or concerned employee, take heed. Our thirst for convenience fueled by technology has created huge business risks that most of us are either ignoring or not even aware of. This series will follow Emily and Ernie, the typical business owner or employee, as they live their lives, and work for or run a business relying on today’s technology. These stories explore how we use technology in our everyday lives, where vulnerabilities exist, the things we do to create those vulnerabilities, and what you can do to make your company and valuable information more secure.

Read more