From the Winter 2017 Issue

Security through Planned Destruction— Using the Cloud to Reduce APT Risk 

Author(s):

Chris Rutherford, CISSP, CAP, Senior Strategic Cyber Consultant, LMI

David K. Shepherd, CISSP, PMP, Senior Consultant, LMI

Many network attacks gaining attention today are advanced persistent threats (APT) that aim to maintain access for long-term data exfiltration. The advent of cloud infrastructure provides a new avenue of defense against persistent network attacks. The ability to plan the destruction and re-creation of virtual machines in the cloud environment can dramatically reduce the time … Read more

From the Winter 2017 Issue

Achilles Heel: The Vulnerability of Embedded Firmware

Author(s):

Terry Dunlap, Founder and CEO, Tactical Network Solutions

Embedded firmware “is the flash memory chip that stores specialized software running in a chip in an embedded device to control its functions.”1 It’s everywhere – in computers, large and small electronic devices, Internet of Things (IoT) devices, medical devices, phones, tablets, cars and a host of other places. The vast majority resides in vulnerable … Read more