There is a National Girls Collaborate Project I actually loved math, can you imagine? My father, the doctor, thought it was ill advised to pursue my studies in mathematics; I think he may have changed his mind. It is never too early to introduce and encourage girls to not only study, but to enjoy, science,…
Connected
by
•Connected
by
•MTTD Four Years Today, in the cybersecurity community, we understand that it is not if you will be breached, but when you will be breached. When I heard that Starwood guest reservation database had been breached, I was not surprised. I was not surprised, not because we are accustomed to hearing about our personal information,…
Connected
by
•The Anatomy of an Attack Did you know that October is Cybersecurity Month? I would like to share an alarming statistic; Europol threat assessment reported that cybercrime is a three trillion dollar business. The dollar amount is higher than the drug trade which includes; heroin, marijuana and cocaine combined. I hate to paint such a…
Connected
by
•Connected
by
•Integrated Security Operation Center – ISOC You Cannot Fight What You Cannot See For those of you asked about last month’s podcast, I offer you this post to help answer your questions. One of the largest concerns in the United States, regarding cyber security, is how to secure the electrical grid. By consolidating all events…
Connected
by
•Connected
by
•Supply Chain Management In July of 2017 new standards were put in place for NERC SIP – 013-1, which is about implementation guidance and SIP – 010-3, which is about software integrity and authenticity. (North American Electric Reliability Corporation, which is associated with FERC, the Federal Energy Regulatory Commission, which is a part of Electric…
Connected
by
•Connected
by
•Data Integrity I have been interested in cyber security since the late nineteen nineties. One of the first things that I learned about was the three tenets of information security, which are confidentiality, availability and integrity. These three building blocks are at the core of every cyber security practice. While there has been debate over…