Category: Blog

CIO Perspective: When the agency CIO heads to Silicon Valley – FCW

I am very pleased Mr. Hyde agreed to join to my growing Board of Advisors.  His decades of experience in the defense and intelligence community, plus his interest in cyber, access control and technical innovation make him a perfect fit.  Mr. Hyde previously w Excerpt below is from the article “When the agency

Analyzing an Outlook phishing attack

It is in my routine to read emails before starting my daily work while enjoying my cup of coffee. While browsing for important emails I need to separate spam emails from legitimate emails and analyze the spam emails. I was trying to sort out the spam emails when I came

‘Oil’ be on your Mind: Recordkeeping and Compliance in Oil & Gas

What do CERCLA, ISO, and SOX mean to you and your business? With increased attention on good governance practices, oil and gas industry members are only an acronym away from experiencing a regulatory rain that rivals hell’s brimstone. Luckily, all the pain can be avoided with good records management and

What’s In & What’s Out: What Should Stay On Your Shared Drives

What’s In & What’s Out: What Should Stay On Your Shared Drives It’s time. You’re finally migrating your files, maybe to a new SharePoint site or some other improved file repository. But it seems like you’re faced with an insurmountable task. Which files should you take with you to this

New Macro Malware Uses Fake Google Enterprise Support Email

In the past months of analyzing malware samples, Macro malware has been on the rise. Last week, we received a fake email of Google Enterprise Support with an attachment file “Info I44185821.zip-> Wire_info_60255.doc”. See the email snapshot below.  The file “Wire_info_60255.doc” is indeed a Word document which contains a malicious

AN ASSESSMENT OF INDUSTRIAL IOT THREATS IN 2015 AND BEYOND

The Internet of Things (IoT) is hot. From light bulbs to refrigerators to smart TVs, companies are under tremendous pressure to get new IoT devices to market and consumers are instantly snapping them up. In fact, the number of devices that are or will shortly be connected to the Internet

Old-New Macro malware meets Old-New “missed courier delivery” Trick

We have covered the resurgence of macro malware at length in our Security Yearbook. Recap – after an absence of around 10-15 years macro malware returned with a vengeance in the last 2 months of 2014. This time the new-old malware is paired with a favorite of the email malware