When looking at technology adoption, I am frequently reminded of Pandora’s Box from Greek mythology. This metaphor rings true when considering the Internet of Things (IoT). Whereas Pandora released a host of evils into the world, with IoT we have released new concerns associated with multiple technologies, multiple standards, scale, and security (or as I like to say, resiliency). When considering the information that flows from the edge, through the cloud, and ultimately to the data center, the lowest common denominator for protecting information is trust created by cryptography (as noted by nCipher’s Juan Asenjo in the other half of this blog series). In this blog, we are going to start by acknowledging the pitfalls of our particular Pandora and then discuss how we find hope in the solution provided by nCipher and Fornetix.Read more
Sterling, VA and Frederick, MD – February 5th, 2019 – Network Runners, Inc, a top technology consulting services company that supports the commercial and federal government market spaces, and Fornetix, a leading provider of encryption key management solutions for cyber security, announced they will partner and showcase cutting-edge defense systems at the AFCEA WEST Conference in San Diego, CA, on February. 12-15, 2019.Read more
Ariel Mahlmann is a sales and marketing intern with Fornetix. A recent University of Maryland graduate with a bachelor’s in economics, Ariel focuses on cyber security market research and social media marketing for Fornetix.
Would you consider giving up personal data in exchange for a third-party app to show you what your ninety-year-old self will look like? The rise of social media brought lots of joy to consumers’ lives, allowing users to get glimpses of their future selves, to find out their horoscopes, and to communicate with others across the globe.Read more
The demand for connected devices is growing exponentially, but the technology to secure these devices is lagging creating cyber security vulnerabilities at a massive scale.
The Current State of Cyber Security
Every day we hear about breaches, hacks, and cyber-attacks affecting banks, hospitals, transportation, and even entire cities. In some instances, the impact can mean life or death. Our most trusted institutions – like the US election process – are not the pillars of security they once were. And yet the demand for “connected everything” continues to grow in all sectors and across the globe.Read more
A special thank you to Maha Amircani for her guest post discussing the reality of cyber vulnerabilities faced by major cities. Maha is an attorney in Atlanta, Georgia and founder of Amircani Law. A Georgia native born to immigrant parents from Egypt, Maha represents clients in city, state and federal court litigation as well as administrative proceedings. Her practice specializes in the areas of personal injury, criminal defense, and real estate closings.
There has been a lot of interest in protecting businesses from the threat of ransomware. But, city governments are at real risk and the impact reverberates to people like me who interact with them daily. After the City of Atlanta ransomware attack in March 2018, this became crystal clear.Read more
Utilizing Key Orchestration During a Hospital Ransomware Event
In Part 2 of this series, we examined the ongoing transition from Cyber Security to Cyber Defense, discussing Cyber Defense effects and utilizing Key Orchestration to realize those effects. In this post, we continue the discussion as we demonstrate how Key Orchestration enables the effects in a real-world scenario.
For practical consideration, let’s examine the following environment: A healthcare enterprise with 15 hospitals, two data centers, and multiple third-parties who use hospital technology resources. The IT infrastructure represents a number networks, applications, storage solutions, and network-connected diagnostic equipment.Read more
It’s been a little over a year since exclaiming that Cyber Security is dead. In that year, we have seen broader acceptance of terms like Defense and Resiliency. We have even seen attempts to pass laws that are the cyber equivalent of the “castle doctrine” for home defense. All that aside, one term that is starting to show up in this space is Orchestration. In practice, tools that support AI, machine learning, or analytics are turning to the term Orchestration to address what happens next. Applying the OODA loop (Observe, Orient, Decide, Act) is an easy way to look at this — if SIEM, AI, machine learning, big data, etc. are about Observe and Orient, then Orchestration is about Decide and Act.Read more
I recently had the chance to respond to a LinkedIn post from Larry Cole about terminology for Cyber Security vs Cyber Defense. The conversation with Larry really hits home regarding what we are all doing with technology and services: defending what we consider valuable. I think we have all been wrong in calling it Cyber Security. It’s time to start saying Cyber Defense and act accordingly.Read more