Kevin Mooney

Picture of
Kevin has been doing computer security work for more than 12 years in both the public and private sectors. His focus is in solutions architecture and technology integration. When he’s not designing IT solutions, Kevin enjoys crafting new cocktails, traveling to new countries, and playing video games with his wife.

Recent Posts

Your Data Is in the Cloud and It's at Risk

June 26, 2018 / by Kevin Mooney

Companies and individuals are using cloud services more and more. Putting so much of our data into the cloud introduces a growing problem. The lines between public cloud, private cloud, and software-as-a-service (Saas) have rapidly blurred as new technology develops, redefining what “cloud” actually means. Some businesses put significant portions of their infrastructure into the cloud and choose to keep only a very small footprint in a traditional data center or office. More commonly, businesses will leverage SaaS to handle common IT requirements such as email, storage, CRM, and backups.

Read more

With Great Code Comes Great Vulnerability

December 21, 2017 / by Kevin Mooney

How Auto Makers Are Working to Secure Connected Cars

Last week, I attended the inaugural Auto-ISAC summit. "ISAC" stands for Information Sharing and Analysis Center. There are several long-standing ISACs for other industries including aviation, electricity, natural gas, and financial services. You can find the full list here if you are curious.

Read more

The Impact of GDPR and What Encryption Can Do About It

September 26, 2017 / by Kevin Mooney

In April 2016, the General Data Protection Regulation was signed into law by the European Parliament and was enforceable as of May 25th 2018. This EU regulation lays out a wide number of policies that require businesses to protect personal data. Companies must have policies and technology controls to securely store or transfer personal data of any person residing in the EU. The way the various articles of the regulation read, this means at a minimum that data needs to be encrypted or made anonymous.

Read more

Data Breach Hits HBO: How Do We End This?

July 31, 2017 / by Kevin Mooney

Today, HBO announced publicly that they have experienced a “cyber incident which resulted in the compromise of proprietary information.” Like many other companies, HBO also stated that “data protection is a top priority” and yet we have seen a common theme that has become more prevalent in recent years. Large companies have trouble protecting their data.

Read more

The Strong Case for Interoperability, Part 1

June 23, 2017 / by Kevin Mooney

What is interoperability and how did it get started? The idea of interoperability was born in the world of manufacturing. If you think back to before the industrial revolution, machines and inventions were created as one-off systems.

Read more

A Primer on FIPS 140-2 Certifications

May 25, 2017 / by Kevin Mooney

Last week I spent my time attending the International Cryptographic Module Conference outside of Washington D.C. A recurring topic of interest to those in attendance was FIPS 140-2. There were a lot of questions around the topic, so I thought it beneficial to explain the basics of FIPS 140-2 certifications.

Read more
1
Page 1 of 1

Subscribe to Email Updates

Recent Posts