Do You Need a Cyber Insurance Policy?

Background The first Cyber Insurance (CI) policies were developed for businesses in the late 1990s because of the multitude of emerging technologies that were present at that time, most notably the Internet.  Implementation was limited as the plans offered were very specific terms of coverage and large-scale demand didnt yet exist.  Around the mid-2000s policy […]

How to Install Kali Linux as an App in Windows 10

Introduction Recently Kali Linux was released as an application in the Microsoft Store.  Through utilization of the Windows Subsystem for Linux (WSL) compatibility layer, its now possible to install Kali in a Windows environment.  WSL is a feature in Windows 10 that enables users to run native Linux command-lines tools, Bash, and other tools previously […]

Examining the Threat of DDoS

Background Roughly fifteen years ago as broadband internet was beginning to expand throughout North America, I like many other teenagers was reaping the benefits as an avid online gamer.  When latency and ping times steadily began to drop, first person shooter (FPS) games like Quake and Counterstrike developed massive followings.  The subsequent corporate backing of […]

Protecting Against Data Destruction Attacks

Olympic Destroyer Recently, a string of cyber attacks disrupted services and caused a multitude of IT-related issues at the Winter Olympics in PyeongChang.  While who is behind the attacks and the method of compromise are currently unknown the intention of the malware, known as ‘Olympic Destroyer’, appears to be focused solely on data destruction.  Talos […]

Spectre and Meltdown: What You Need to Know and How to Protect Yourself

What are Spectre and Meltdown? Earlier this year security researchers made public the discovery of several vulnerabilities affecting nearly every computer, laptop, and smartphone on the market.  Known as Spectre and Meltdown, the vulnerabilities exist in the design of modern processors and allow for sensitive information (passwords, e-mail, browsing history) to be read from memory […]

Trouble in Paradise: Hawaii Emergency Mismanagement

On Saturday January 13, 2018, people in the Hawaiian islands found themselves in the midst of a large-scale panic when an emergency alert for a ballistic missile attack was broadcasted statewide.  An official all clear message was issued 38 minutes later to both residents and visitors of the islands.  However, not long after the collective […]

Defense Strategy for BYOD Networks

    Bring your own device (BYOD) is a trend that has grown increasingly common over the past several years among companies both big and small.   It allows employees to utilize their personal devices in the workplace by connecting them to the internal network, access key files from practically anywhere in the world, and most […]