Uncategorized

Cyber Security Awareness Month 2014: Protecting Critical Infrastructure & The Internet of Things

protecting critical infrastructure

This is the second article in our series for National Cyber Security Awareness Month. To read the first article, click here. Interconnectivity is fundamental to modern life. On a grand scale, the systems supporting our transportation, telecommunications, banking and other necessities all rely on their ability to connect. Every day, even before we power up our laptops and smartphones, we ...

Read More »

When Confidence Becomes a Threat to Cyber Security

general04

“Danger breeds best on too much confidence,” writes Pierre Corneille in the Tragicomedy, Le Cid. And though the line is more than 370 years old, they are apt words of caution for cyber security today. In its 2014 Global State of Information Security Survey, consulting firm PwC found that executives are increasingly confident in their company’s security initiatives. They have ...

Read More »

Lunarline: Your Partner in Security Compliance

services02

On paper, the work of a cyber-security team sounds like one nonstop adventure! Stopping the attacks of cybercriminals around the world who are continually developing more sophisticated and more frightening exploit methods – it’s not a bad starting premise for a techno-thriller, right? Sure, staying a step ahead of malicious hackers has the potential to get interesting. However, the more ...

Read More »

Introducing Vulnerability Scan Converter

Detecting vulnerabilities is a necessity for any IT department hoping to keep their infrastructure secure or any IT security professional administering a Security Control Assessment. For that purpose, there is no lack of tools to scan the various facets of an organization’s pivotal technology: the Cisco Router Assessment Tool, Tenable Network Security’s Nessus, Hewlett Packard Web Inspect, App Detective and ...

Read More »