Image for post
Image for post

As a Nation, we cannot effectively expand the competitive space to mitigate near-peer competitors from executing large-scale cyber intelligence or attack operations without a “whole-of-society” approach to cyber risk. The recent SolarWinds supply chain compromise — potentially impacting at least 18,000 organizations — has made this clear. We must move beyond simple cyber threat information sharing and take a more real-time, collaborative approach to cyber risk by leveraging the collective authorities, visibility, expertise, and expert capabilities of our entire society: government, academia, and industry.

Many organizations leverage some form of cyber risk analysis to inform their overall risk posture, determine…

Image for post
Image for post

The cybersecurity industry relies on dedicated people with a specialized skill set. These skills are typically learned as part of a comprehensive Science, Technology, Engineering, and Math (STEM) education. Without a strong STEM educational program, the cybersecurity industry will be unable to fill all of the positions set to develop over the next several years.

Why STEM Education is Important

STEM represents a cross-disciplinary approach to education. In a STEM program, students take classes that integrate across all four of these areas, then apply what they learn in real-world projects.

STEM education today starts at the elementary school level. Thousands of elementary, middle, and high…

Image for post
Image for post

In a world where news of a widespread cyber attack is becoming commonplace, it’s important that your employees receive cybersecurity training regularly. Without proper training, your employees can make innocent mistakes that can have huge consequences for your company’s data security.

Why Your Company Needs Cybersecurity Training

Your employees need training in cybersecurity because they’re not perfect. They may not always be thinking about cybersecurity, or they may get careless. And sometimes, your employees can make mistakes — and employee mistakes can cost your company, in the form of expensive data breaches.

Research shows that 88% of data breaches are caused by employee mistakes. These breaches…

Image for post
Image for post

Enterprises, government contractors, the military — what do they all have in common? Their success relies on good communication. Employees and consultants need to collaborate with one another wherever they’re located, and they also need to easily communicate with different offices and outside vendors.

But with cybercrime on the rise, it’s important that these communications are totally secure, without any opportunity for malicious actors to intercept text messages, listen in on voice calls or video conferences, or steal shared files.

Not wanting to become victims of the next headlining breach, organizations are looking for a secure communications solution — and…

Image for post
Image for post

If your organization becomes the victim of a cyber attack, what steps should you take? With cyber attacks on the rise and cybercrime expected to cost $6 trillion globally in 2021, it’s important that you have a plan for how to respond if your company is attacked.

Detecting a Cyber Attack

Before you can stop a cyber attack, you have to recognize that it’s happening. This isn’t always easy — cyber attackers are good at not being found. As detailed in IBM’s Cost of a Data Breach Report 2020, companies on average take 207 days to identify a data breach and another 73 days…

Image for post
Image for post

Cybersecurity can be viewed as reactive or proactive, or a mixture of both. Not sure what the difference is between proactive and reactive cybersecurity? Below we will explain what cybersecurity practices are proactive or reactive and how end-to-end encryption is an essential part of a proactive security practice.

Comparing Proactive and Reactive Cybersecurity

All cybersecurity is designed to protect an organization’s valuable data and communications. Reactive cybersecurity involves responding to attacks that have already taken place, while proactive security involves identifying and protecting against new and evolving risks before an attack happens. Both types of cybersecurity are necessary.

Understanding Reactive Cybersecurity

Some might view reactive cybersecurity as scrambling…

Image for post
Image for post

Every organization needs to foster communication and collaboration between its employees, while at the same time maintaining a level of security that protects the company’s most valuable assets. What communication methods are necessary for the success of your enterprise-and how can you best secure those processes?

Why Secure Communication is Important to the Enterprise

A successful business depends on effective and efficient communication between its employees. This is even more vital today with a significant increase in remote workers. As offices become more virtual, employees need to collaborate with each other in real-time, no matter where they’re located.

Unfortunately, communicating with co-workers is a significant issue among remote…

Image for post
Image for post

When the news broke about the SolarWinds cyber attack, it was clear that this was a breach unlike any we have seen before. From the method of the attack to its sheer scope, this hack has not only affected many in the private sector, but also several government agencies. To highlight the magnitude of this breach, here are some key data points:

  • SolarWinds has 300,000 customers, with fewer than 18,000 having installed the products that contained the vulnerability.
  • The vulnerability was slipped into a SolarWinds update that was released in March of 2020, 9 months before the breach was discovered.
Image for post
Image for post

As we ring in the new year, it is natural to reflect on the year behind us and look ahead to the year in front of us. Memories of 2020 will likely revolve around the COVID-19 pandemic, when the world seemed to stand still at the threat of the novel coronavirus. Many started working remotely this year in an effort to stop the spread of the disease.

With the number of remote workers increasing drastically, data security became paramount in a way we have never seen before. While keeping employees home helped reduce the risk of the virus, it increased…

Image for post
Image for post

Because the Department of Defense (DoD) is broadly charged with defending the country against all threats, military and otherwise, cybersecurity has always been part of its portfolio. The DoD first warned about potential vulnerabilities in computer networks almost fifty years ago, and over the years the individual branches of the military set up their own cybersecurity operations.

However, it wasn’t until 2010 that the DoD consolidated the majority of its cybersecurity operations, known as Defensive Cyber Operations and DoD Information Network Operations, into a single sub-unified command: U.S. Cyber Command (USCYBERCOM). …

Wickr

Secure Ephemeral Communications. Built for the enterprise. End-to-end encrypted messaging. Secure rooms. Peer-to-peer encrypted file sharing. Multi-platform.

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store