information

Home/Tag: information

Layer 8 Security Presents at Rittenhouse Ventures’ Technology Leaders Forum

PRESS RELEASE Contact: Kat Jimenez, Sales and Marketing Assistant  kat.jimenez@layer8cybersecurity.com February 9, 2016 - The Navy Yard, Pennsylvania - Layer 8 Security presented at the inaugural Technology Leaders Forum hosted by Rittenhouse Ventures at their headquarters in Philadelphia. Chief Technology Officers and senior leaders within the Rittenhouse Ventures portfolio of companies attended the event to discuss the challenges and opportunities relating to technology. Following the theme of the forum, Layer 8 Security spoke about Data Security and covered the following [...]

Identity Protection for Those Affected by the OPM Data Breach

Layer 8 Security specializes in improving the cybersecurity posture of companies big and small, but we also strive to protect individuals as well. In keeping with our "sheepdog" mentality, I want to broadcast some important information to individuals affected by the Office of Personnel Management (OPM) data breach. If you were not one of the 21.5 million individuals targeted in the widely publicized OPM data breach announced this past June, there is a high chance that you are related to or [...]

Today’s SDLC and Cybersecurity – Coding, SMEs, and Spaghetti

One of our friends in the insurance world sent us an email with an interesting article about the nature of "secure programming" (see here for the article) and how it has influenced some of the information security challenges the market is facing. I initially shared my insights (below) to the email, but I figured it was worth posting. Enjoy! -- -- Over 30 years ago, one of my personal heroes (Ken Thompson, coder-extraordinaire and inventor of the B and Go programming languages) said something [...]

What’s the deal with LifeLock?

I often get questions from friends and family about LifeLock, an identity theft protection service - what it's all about, whether I use it (I don't), how effective the LifeLock services are, etc. Ironically, about a week and a half ago, LifeLock agreed to pay $100 million (see here) for allegedly breaching a FTC order by: "Failing to establish and maintain a comprehensive security program to protect its customers' sensitive personal information, including Credit Card, Social Security, and bank account [...]

Terms of Service and Privacy Policy Changes Making the News

Today, Snapchat, the popular social media mobile app that allows users to send instantly-destructible pictures and videos to friends, has been in the news (here, and here) because of recent changes to its Terms of Service (ToS) and Privacy Policy. Here are some key initial takeaways from this news event: Security changes matter to consumers -- and are getting due coverage. As a consumer, it's great to see these policy changes make the news. A couple years ago, it was unlikely that [...]

Phishing Alert: Ashley Madison Scams Quickly Spreading

This week 36 million names, addresses, and phone numbers of registered users of the Ashley Madison website (which makes it easy to cheat on your spouse) were posted on the Internet.  All these records are now out in the open, exposing highly sensitive and personal information. Internet criminals are wasting no time exploiting this in many ways, sending spam, phishing and possibly blackmail messages. There have already been reports of social engineering tactics which try to convince people to click on links [...]

IT and Security: One Team or Two?

Stop me if you've heard this request before..."we need project X delivered, as soon as possible."  To the requester, there is no corner not worth cutting. Whether they know it or not, they have a disregard for the processes that are usually in place to make sure things are done by the book. Put plainly, in an IT department, speed has a troubling tendency to trump security or general processes, most especially when the security arm for your firm is [...]

IoT can help manufacturing, but does it make you less secure?

When companies began to embrace the idea and the tech behind the Internet of Things (IoT), one area that stood to benefit the most was, and is, the world of manufacturing. Anyplace that relies on efficient operations to keep things flowing, and does so using a litany of systems, lends itself well to the burgeoning world of IoT. Imagine if all of your numerous systems are becoming much more easy to network and thus control online-it would be a godsend [...]

Beware of Public Wifi

Honestly, in our present day, that seems like it should be common sense, but all too often it is not. Yet another news story is shining a spotlight on the fact that another form of public wireless, this time hotel access, is vulnerable. (http://www.csoonline.com/article/2902740/vulnerabilities/flaw-in-common-hotel-router-threatens-guests-devices.html#tk.rss_all) Let me state the obvious: effectively, all wireless access is vulnerable. If you want to be security-minded, you have to expect that any connection you have can be breached. To think otherwise will lull you into [...]

2017-06-22T20:19:42-04:00By |Tags: , , , , |