Protecting BGP Sessions – Step-by-Step Guide to Prevent an Easy DDoS

Organizations are not protecting their BGP session. Take the time to ask the question …. Do we have our BGP ports protected? Are you: If not, work with your peers to deploy an Infrastructure ACL (iACL) to cover all your network devices, deploy specific data plane ACLs on your routers/switches to protect them, work with

CISOs, get your First Sergeant

Behind Every Effective CISO, a First Sergeant is Clearing the Path for the organization’s success. The way we’re setting up our CISO structure is NOT working as expected. The threats keep on coming. Organizations put their fingers in the dike, plugging security risks while exhaustingly bailing water from a sinking boat. This is a no-win Read More

Cyberwarfare is here; now what?

Cyberwarfare activities were always on the Internet. STUXNET, Google Aurora, and many other attacks were a fact of life. We had cyber attacks when Yugoslavia broke up. We have constant attacks in the Middle East. Cyberwar was part of a security practitioner’s threat model from the late ‘80s until the early 2000s. Then, cybercrime started Read More

Why Are Cybercriminals Targeting Healthcare?

Why are cybercriminals targeting healthcare when the medical community puts patients first? Why are cybercriminals taking actions that threaten people’s lives at risk? The focused cybercriminal targeting of healthcare is now an increasing cause of death. Is this data suppressed? Why? The liability insurance covering all the healthcare community’s medical care would skyrocket. The closure

Welcome to CyberWar & LongTerm Ramification Unleashed by Russia’s War

Cyberwar is today’s reality. We’ve moved from a world of cyber-criminal threats to an interconnected arena where any malicious activity is feasible. Cyber-Kinetic attacks that destroy, kill, and massively disrupt civil society are part of our new security threat landscape reality. Geography will not help. The massively interconnected Internet means that you are a cyberwarrior’s

Loading Spoofer to Fight DDoS

Do you run a network? Do you secure an organization? Do you build applications? Do you want DDoS Attacks to be easy? Of course not! Everyone running, securing, or building something on the Internet does not want it easy to attack that service. We’re asking people to load the Spoofer application to Fight DDoS. Loading Read More