Monthly Archives: January 2016

Home/2016/January

China Is Cutting the Legs Out from Under American Businesses (but please don’t stop them?)

Businesses and their executives everywhere should be aware of this story run by 60 Minutes on Jan 17, and the blog Jeff Lipson wrote about here. The fact that China is stealing U.S. companies’ intellectual property is not news. The fact that President Obama worked with the Western District of Pennsylvania to indict five Chinese officers of [...]

By |2017-06-22T20:19:40+00:00January 27th, 2016|Categories: Blog|Tags: , , , , , , , , , , , , , , , , , , |Comments Off on China Is Cutting the Legs Out from Under American Businesses (but please don’t stop them?)

Protecting Philadelphia Companies from Chinese Hacking – Part 1

Last night, 60 Minutes ran a segment on China’s massive theft of intellectual property from US businesses.  http://www.cbsnews.com/news/60-minutes-great-brain-robbery-china-cyber-espionage/ The episode highlighted that the Chinese government is using its military and intelligence services to give its companies an edge over US business, by stealing our trade secrets.   My Team and I spent a number of [...]

By |2017-06-22T20:19:40+00:00January 18th, 2016|Categories: Blog|Tags: , , , , , , , , , , , , , , , , , , |Comments Off on Protecting Philadelphia Companies from Chinese Hacking – Part 1

Identity Protection for Those Affected by the OPM Data Breach

Layer 8 Security specializes in improving the cybersecurity posture of companies big and small, but we also strive to protect individuals as well. In keeping with our "sheepdog" mentality, I want to broadcast some important information to individuals affected by the Office of Personnel Management (OPM) data breach. If you were not one of the 21.5 [...]

By |2017-06-22T20:19:40+00:00January 18th, 2016|Categories: Blog|Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , |Comments Off on Identity Protection for Those Affected by the OPM Data Breach

Long Awaited Cybersecurity Bill – CISA 2015

The Cybersecurity Information Sharing Act (CISA) of 2015 recently became law before the new year. The proposal, while controversial, has evolved into what amounts to Congress’s first major policy response to cyber attacks that have hit Target, Home Depot, JPMorgan Chase, and Sony Pictures, as well as government agencies. Information-sharing legislation has failed in Congress for years amid [...]

By |2017-06-22T20:19:40+00:00January 11th, 2016|Categories: Blog|Tags: , , , , , , , , , , , |Comments Off on Long Awaited Cybersecurity Bill – CISA 2015

Today’s SDLC and Cybersecurity – Coding, SMEs, and Spaghetti

One of our friends in the insurance world sent us an email with an interesting article about the nature of "secure programming" (see here for the article) and how it has influenced some of the information security challenges the market is facing. I initially shared my insights (below) to the email, but I figured it was worth posting. Enjoy! [...]

By |2017-06-22T20:19:41+00:00January 5th, 2016|Categories: Blog|Tags: , , , , , , , , , , , , , , , , , , , , , , , |Comments Off on Today’s SDLC and Cybersecurity – Coding, SMEs, and Spaghetti