Archive for the ‘Cyber Security’ Category

 VIMRO, LLC - Michael Horsch Fizz

Source: DARK READING: Jai Vijayan

Concerns over the action are sending VPN sales soaring, some vendors say.

The Trump administration’s move to repeal a Federal Communications Commission (FCC) rule that would have prevented ISPs from selling customer data to third parties has widespread security implications for users and organizations, industry experts warned this week.

The Obama-era FCC rule was to have gone into effect later this year. It would have prevented Internet service providers from collecting and selling data such as a customer’s Web browsing history, location data, and other data related to the user’s online activities without explicit permission.

The White House, FCC chairman Ajit Pai, and others wanted the bill repealed on the grounds that it unfairly favored one set of companies on the Internet over another. The main argument was that the bill would have restricted carriers including AT&T, Verizon, and Comcast from collecting and selling data on a user’s online activities, even as Internet giants such as Google, Facebook, and Twitter were free to do so.

Read Full Post »

FCI_Linkedin_small

Read Full Post »

Security Information and Event Management (SIEM)
Vendor Comparison and Scoring Calculator

SIEM Vendor Scoring Calculator 2016-03-05 at 3.08.23 PM copy copyDownload SIEM Vendor Comparison and Scoring Calculator (MS EXCEL)

Free to download and use to compare / contrast SIEM Vendors. We have done the heavy lifting for you by utilizing the most common criteria for SIEM vendor evaluations. Includes weighting in order to take into account your environment, importance of criteria, and any unique distorting factors.

www.vimro.com
(800) 272 0019

 

 

Read Full Post »

Breakfast Meeting and Presentation

Wednesday, 04/20/2016 8:00 am – 10:30 am

Summary

Learn how the psychology of persuasion (POP) is leveraged for good and evil to create moments of mitigation or misery (MOM) in security.

Significant improvements in security technology have made it difficult for cybercriminals to steal sensitive data by solely penetrating computer systems. Social engineering relies on momentary weaknesses in people, and it’s easier to deceive someone than it is to hack into systems. Protecting your company from social engineering attacks requires fluency with ever increasing sophisticated social engineering techniques.

“Know thy self, know thy enemy. A thousand battles, a thousand victories.”
Sun Tzu

Michael Horsch Fizz

Speaker: Michael Fizz

Empowered with the principles of persuasion, white hats can help everyone in an organization create innumerable moments of mitigation (MOM).  More importantly, fluency with the use of principals of persuasion utilized by black hats will empower you to stay ahead of their nefarious intent.

Questions we will answer:

  • What are the six principals of persuasion utilized for good and evil in social engineering?
  • What are your organization’s Moments of Truth (MOT) that result in mitigation and maintained security or breach? 
  • How do you leverage MOM and POP to influence and empower ALL members of your organization and significantly mitigate attacks and reduce risk?

Agenda:

• Breakfast & Networking: 8:00 – 8:30

• Professional Meeting:  8:30 – 10:30

2 CPE’s will be granted for attendance.

Details:

When: Wednesday, April 20, 2016 – 8:00 AM – 10:30 AM

Where: Wolf and Company, 99 High Street, Boston, MA   02110

REGISTER

Read Full Post »

Vimro_CyberSecContact VIMRO to better understand DDoS and the advanced solutions available today.

Connect with VIMRO on Linkedin

Arbor’s Live Denial of Service Attacks (DDoS) Map 
Screen Shot 2016-03-04 at 10.20.51 AM

Screen Shot 2016-03-04 at 10.23.26 AM

DDoS Map and Table

 

 

 

Read Full Post »

Cyber Threat Real Time Map

Kaspersky’s Cyber Threat Real Time Map

Screen Shot 2016-03-04 at 10.02.37 AM

Shared by our new friend Kevin Duffy from Cyber Rescue.  Thank you Kevin.

Read Full Post »

Learn how to demonstrate ROI.  

When VIMRO conducts an ROI assessment for multifactor controls, we can demonstrate that the control is less expensive than the hard costs associated with one mere breach.  Learn the details and download the Multifactor Authentication Evaluation Requirement Table.

GO

Have a fantastic SUPER TUESDAY!

Michael

Read Full Post »

IoT_VIMRO

Read Full Post »

VIMRO Published Posts and Press Releases

Read Full Post »

Michael Horsch Fizz, CBDO 617 299 8510

Just like Lucifer, the Dark Net is known by many names with only subtle differences in meaning: the Dark Web, the Digital Underground, and the Deep Web, to name a few. Dark Net sites are difficult to find because they do not show up in normal search engines, but they are accessible through TOR or Tails. At their core these sites are meant to serve one purpose: enable privacy and free speech on the Internet. Unfortunately, they also provide fertile ground for illegal activities, such as selling contraband drugs, firearms, and stolen data, as well as much worse crimes.
When you hear a news story about yet another data breach, you can be confident the stolen data will be available on the Dark Net, on information brokerage sites known as Dark Markets. Some of these Dark Markets trade in stolen data (credit cards, Social Security numbers, personally identifiable information, protected health information, and so forth). Figure 1 below depicts….. READ the full paper


 

LinkedIn Cyber Security Posts

VIMRO, LLC - Posts by the VIMRO Advanced Cybersecurity Team

Read Full Post »

Older Posts »