Unmanned aerial systems remain largely in their infancy, and yet they already threaten defense and intelligence operations: advanced surveillance capabilities of these systems enable adversaries to collect data and information to shape military tactics, and swarming techniques increasingly serve as a means for adversaries to distract, to disorient, and disrupt. Such threats, combined with others … Continue reading Countering the counter-UAS Shortcomings
Rutrell Yasin
Cybersecurity In The Obama Era
On February 9, President Barack Obama announced the Cybersecurity National Action Plan (CNAP), which he described as the capstone of more than seven years of determined effort by his administration. The plan builds upon lessons learned from cybersecurity trends, threats, and intrusions. The plan also directs the federal government to take new action and pave … Continue reading Cybersecurity In The Obama Era
So You Want To Be A Penetration Tester
Although penetration testing might be viewed as one of the more glamorous jobs in cybersecurity – think of Tom Cruise in Mission Impossible hacking into a CIA computer while dangling horizontally from cables in a heavily protected room – it might come as a surprise to learn that one of the challenges of the profession … Continue reading So You Want To Be A Penetration Tester
GETTING TO KNOW YOUR OTHER AUDIENCE: PART 2
Shannon Felder, senior account executive with LEWIS Global Communications, recently interviewed Tech Writers Bureau’s Rutrell Yasin for her blog, covering issues such as technology and the government sector, cybersecurity, and how public relations professionals can be more effective working with folks in the media. Here’s an excerpt: You’ve been covering technology for more than 30 … Continue reading GETTING TO KNOW YOUR OTHER AUDIENCE: PART 2
IBM Watson Will Help Battle Cyberattacks
IBM Security is giving its cloud-based cognitive technology Watson a new assignment: cybersecurity. The new Watson for Cyber Security is now in training at IBM to study the nuances of security research findings in order to more effectively discover patterns and hidden cyberattacks. IBM’s X-Force research library will be a central part of the materials … Continue reading IBM Watson Will Help Battle Cyberattacks
Hacker Group Exploits “Hot Patching” In Windows To Cloak Cyberespionage
A cyberespionage group is using an advanced persistent threat technique that exploits an obscure Windows OS feature known as “hot patching” to cloak backdoors they have created in targeted systems and networks of government agencies and telecommunications companies in Asia and Southeast Asia, according to Microsoft. The group, called Platinum by Microsoft researchers, has gained … Continue reading Hacker Group Exploits “Hot Patching” In Windows To Cloak Cyberespionage
4 Tips For Planning An Effective Security Budget
Where does the information security budget reside and who owns it? That’s an ongoing debate as organizations allocate resources to protect critical assets in a dynamically changing technology and threat environment. In many organizations, chief information security officers report to the chief information officer, because security operations and budgets are part of the IT department. … Continue reading 4 Tips For Planning An Effective Security Budget
How To Raise Your Salary In Cybersecurity
Cybersecurity salaries continue to rise as organizations grapple with an increasing shortage of cyber talent. Given the current climate, job-hopping might seem like a way to earn more money in the short term. However, developing the necessary skills that are in demand and showing how security adds value to your organization is a surer way … Continue reading How To Raise Your Salary In Cybersecurity
A Day In The Life Of A Security Analyst
Some days start out quiet—too quiet—for a cybersecurity analyst. Others, not so much. “We never know what is going to happen. A day can start out calm or start out on fire and very quickly go from one or another,” says Jim Treinen, a security analyst for ProtectWise, who spends his days defending both his … Continue reading A Day In The Life Of A Security Analyst
Transitioning CoCo: How to manage IT in partnership with private industry
Federal IT executives are increasingly expected to improve efficiency by leveraging new technologies, but legacy technology and processes often eat up the bulk of available resources. To that end, federal agencies are beginning to shift to contractor-owned, contractor-operated IT, shedding restrictions that are so often tied to the infrastructure. With on-demand access to shared and … Continue reading Transitioning CoCo: How to manage IT in partnership with private industry