Delete Me Not: How One API Call Could Wipe Accounts Clean

Bug bounty programs continue to prove their value by helping organizations uncover security flaws that would otherwise slip through the cracks. For those of us in cybersecurity,…

Client Confidence Crisis: How Neglecting Security Practices Can Drive Customers Away

In today’s digital landscape, establishing an Information Systems Security Program (ISSP) is no longer optional but a crucial necessity for organizations. This blog post explores the vital importance of implementing an ISSP early on and understanding the factors that influence its establishment and modification. Senior management’s role in championing ISSPs is emphasized, as their buy-in and recognition of its significance set the tone for organizational security practices.

However, misconceptions and flawed reasoning often hinder the adoption of robust security measures. From the belief that “it will never happen to us” to relying solely on insurance coverage, these notions can prove detrimental to an organization’s security posture. Furthermore, assumptions that clients don’t care about security or that the cloud provides ultimate protection are debunked, shedding light on the evolving expectations and regulations surrounding data protection.

The ugly truth emerges as we delve into the constant threat of internet vulnerability scans and the risks organizations face when vulnerabilities are discovered. This post aims to dismantle these flawed mindsets, highlighting the need for a comprehensive security approach beyond insurance coverage and the importance of addressing vulnerabilities proactively.

Stay tuned for the upcoming parts of this conversation, where we will explore additional influential factors and provide insights into developing effective ISSPs. Together, let’s navigate the complex world of system security and ensure the protection of your organization’s invaluable assets.

Investigating the FAA Outage: Separating Fact from Fiction

On January 11th, the Federal Aviation Administration (FAA) experienced a nationwide outage that caused widespread delays and cancellations for flights across the United States. The outage was caused by a problem with the FAA’s NOTAM (Notice To Air Mission) system.

NOTAMs are messages issued by the FAA to provide pilots with important information about flight restrictions, hazards, and other critical information. The NOTAM system is a critical component of the FAA’s air traffic control infrastructure, and the outage caused a ripple effect throughout the entire aviation system.

What Is Symmetric Encryption? [VIDEO]

Symmetric Encryption is an algorithm that uses the same secret key to both encrypt and decrypt plaintext into ciphertext….

Escaping Traditional Cyber Security Awareness Training

One of the apparent challenges many have with today’s methods of learning is literally consuming the same material without flair or consequences. In hindsight, I can see where that would be an issue.

Hacker Attempts To Poison Florida Water Supply

Last week it was reported that a Florida metropolitan water plant was a victim of a cyber attack. The threat actor reportedly accessed the water plant’s supervisory control and data acquisition or SCADA…

Sage N Clements on Insurance Requirements

A friend of mine ask me to be a guest host on their inaugural podcast to talk about Cyber Insurance and Information Security. I could not hesitate to help him out….

Cyber Security Awareness Month – Suspicious Emails

As you may know, October is Cyber Security Awareness month. Being an IT Security Professional, I wanted to use this month to provide a series of posts that provide tricks and tips on how to better protect yourself…

How I Studied And Passed The CISSP Exam in 2020

Everyone has heard the stories of how tough the Certified Information Systems Security Professional (CISSP) examination is. It’s been described as taxing, mind-blowing and hard to pass. In fact, in many tech circles,

Sage Knows IT: The Case to Ban TikTok

The Case To Ban TikTok In 2020

In recent weeks, reports from the IT Security community have surfaced that a popular short-form video app, called Tiktok may be collecting excessive and potentially unusual user data. A user by the name of…

RSS302
Twitter638
YouTube0
YouTube
Pinterest0
fb-share-icon
LinkedIn
Share
20