The Most Vulnerable Part of a Network is…
What do HBGary, RSA, and Apple have in common? They were all victims of a social-engineering attack. There is a common saying in the InfoSec community that the most vulnerable portion of a network is...
View ArticleShould I Stay or Should I Go? The GoDaddy Outage
On September 10, around 10:30am, GoDaddy reported via their Twitter account that they were experiencing connectivity issues and were investigating the cause of the problem. Four hours later, it was...
View ArticleMandiant Reports Recent Data Hacks
This week, Mandiant, a Virginia-based cybersecurity firm released an extensive report accusing a Chinese military unit of hundreds of attacks on American businesses in search of intellectual property....
View ArticleHacker Group Compromises Major Corporation
A hacker compromises a major corporation and hides in the shadows for months, silently reading e-mails and monitoring traffic. The hackers notify the company and make demands. The FBI infiltrates the...
View ArticleHow Much Personal Information Are You Giving Up?
As a professional in the data security field, naturally I am a privacy-conscious person. And since I do not believe in Government surveillance and cameras on every street corner, I do take extra steps...
View ArticleOWASP Top 10 Web Application Vulnerabilities – 2013 Edition
I was listening to a podcast a few weeks ago, and the host mentioned that he had been reviewing the show when he realized he had accidentally been listening to an episode that was over a year old. The...
View ArticleStaying Hidden in Cyberspace
This time last year, I was reading an article in Wired magazine about the new NSA data center being built in Utah and wondering what a yottabyte is (it is over 1 trillion Terabyte). I, along with other...
View ArticleBe Cautious When Using Your Phone as a Wi-Fi Hotspot
I’m sure that just about everybody has seen or read an article by now that explains why open Wi-Fi Networks are dangerous. Well, due to a recently disclosed vulnerability, using your phone as a hotspot...
View ArticleProtecting Against Cloud-Based Vulnerabilities
As more and more applications move to the cloud, more and more responsibilities are shifted from the internal organization network administrators to cloud-service providers. Organizations can rely on...
View ArticleMID-ATLANTIC FCU IT AND SECURITY CONFERENCE
Last week, I had the opportunity to attend the IT and Security Conference hosted by the Mid-Atlantic Federal Credit Union. Being a self-proclaimed internet aficionado and knowing the caliber of the...
View ArticleReclamere’s Weekly Security Update: Episode 3- Social Engineering
Social Engineering is one of the easiest, effective ways for an attacker to infiltrate an organization. Do you think your organization is prepared to combat against an attack where patches, upgrades,...
View ArticleReclamere In The Media
Last week, Blair County was hit with two terroristic threats; one was a bomb scare at the Blair County Courthouse and the second was tampering with the water supply. Below, Reclamere’s CEO Angie Singer...
View ArticleRECLAMERE’S WEEKLY SECURITY UPDATE: EP 5 – OCR AUDIT CRITERIA
HIPAA Compliance Guidelines have quickly become the standard rule-set for organizations dealing with any type of healthcare information. However, with the importance of HIPAA compliance, complexity of...
View ArticleReclamere’s Weekly Security Update: EP 7- Cryptolocker
A new ransomware virus dubbed ‘Cryptolocker’ is terrorizing the Internet and rampantly infecting thousands of people. This week on the Reclamere Weekly Security Update, Security Engineer Kirk Durbin...
View Article
More Pages to Explore .....