Monthly Archives: June 2015

Home/2015/June

Balancing Security And Customer Satisfaction

For those of us who perform any functions in cybersecurity, you know how much of a challenge it can be to strike a balance between needed levels of security and a happy customer base. The two are often at odds, considering that they are usually diametrically opposed. The CISO and his minions seek the utmost [...]

By |2017-06-22T20:19:42+00:00June 29th, 2015|Categories: Blog|Tags: , , , , , , , , , |Comments Off on Balancing Security And Customer Satisfaction

Layer 8 Security Providing Insights to Local Manufacturers

PRESS RELEASE Contact: Casey Lipson, Sales and Marketing Coordinator casey.lipson@layer8cybersecurity.com June 24, 2015 Exton, Pennsylvania - Kevin Hyde, Managing Director of Layer 8 Security, participated as a cybersecurity expert panelist at the Lower Bucks County Chamber of Commerce's Manufacturing Alliance Forum on June 18, 2015 at the Keystone Industrial Park in Fairless Hills, PA. Attendees [...]

By |2017-06-22T20:19:42+00:00June 24th, 2015|Categories: Press Releases|Tags: , , , , , , , , , , , , |Comments Off on Layer 8 Security Providing Insights to Local Manufacturers

Could IPv6 Be A Boon For DDoS Attackers?

In my eyes, IPv6 is today what VoIP was in the early 2000's-that is, a protocol which, while it carries great promise, takes forever to gain critical mass. I recall many years where vendors would declare that "this was the year VoIP breaks out", only to hear it again from them a year later. IPv6 [...]

By |2015-06-25T17:50:57+00:00June 23rd, 2015|Categories: Blog|Tags: , , , , , , , , , , , , , , |Comments Off on Could IPv6 Be A Boon For DDoS Attackers?

Internet of Things presents new challenges

It is, without a doubt, one of the hottest topics in IT. The Internet of Things, or how data networking is going to effectively connect everything to everyone, has been discussed for quite some time, but it was not until recently where current technology was able to catch up to the theoretical ideas that have [...]

By |2015-06-25T17:48:11+00:00June 17th, 2015|Categories: Blog|Tags: , , , , , , , , , , , , , , , |Comments Off on Internet of Things presents new challenges

IoT can help manufacturing, but does it make you less secure?

When companies began to embrace the idea and the tech behind the Internet of Things (IoT), one area that stood to benefit the most was, and is, the world of manufacturing. Anyplace that relies on efficient operations to keep things flowing, and does so using a litany of systems, lends itself well to the burgeoning [...]

By |2015-06-25T17:45:21+00:00June 17th, 2015|Categories: Blog|Tags: , , , , , , , , , , , , , , , , , , , , , , , , , |Comments Off on IoT can help manufacturing, but does it make you less secure?

Understanding the legal repercussions of our cyber actions: Prosecutor invokes Sarbanes Oxley Act in accusing witness of obstruction of justice by deleting browser history

Every decision we make, every action or inaction, has the potential to harm individuals, employees, and their companies. When scanning media outlets, we are constantly inundated with breaking news about the next breach or the most recent corporate cyber blunder. Staying abreast of this ever changing landscape is critical for business executives. Layer 8 Security [...]

By |2017-06-22T20:19:42+00:00June 10th, 2015|Categories: Blog|Tags: , , , , , , , , , |Comments Off on Understanding the legal repercussions of our cyber actions: Prosecutor invokes Sarbanes Oxley Act in accusing witness of obstruction of justice by deleting browser history

Secure Your SOHO Wireless Routers

This is another one of those things that, for the vast majority of IT professionals, ought to be second nature. When you get something new, with a default username and password...you change it. It's always my first order of business, next to changing the default IP addresses. Locking down any new network gear is imperative, [...]

By |2017-06-22T20:19:42+00:00June 10th, 2015|Categories: Blog|Tags: , , , , , , , , , , , , |Comments Off on Secure Your SOHO Wireless Routers

From Cybersecurity to Scholarships: Giving Back

PRESS RELEASE Contact: Casey Lipson, Sales and Marketing Coordinator casey.lipson@layer8cybersecurity.com June 8, 2015 Exton, Pennsylvania - Jeffrey Lipson, Executive Director of Layer 8 Security, attended the Blue White Scholarship Foundation's tailgate at the Radnor Hunt Club on Saturday, May 16th. "Supporting the Blue White Scholarship Foundation is our way of giving back to the Villanova [...]

By |2017-06-22T20:19:42+00:00June 8th, 2015|Categories: Press Releases|Tags: , , , , , , , , , , , , , |Comments Off on From Cybersecurity to Scholarships: Giving Back

Next Steps In Password Security

It used to be that you had one or two passwords. They rarely, if ever changed. You may have even had it written down on a Post-It note, placed securely next to the very PC it protected. Nowadays? Even if you are not a sysadmin, odds are you have half a dozen (or more) accounts [...]

By |2015-06-03T19:47:01+00:00June 3rd, 2015|Categories: Blog|Tags: , , , , , , , , , , |Comments Off on Next Steps In Password Security