IP and Data Anonymization 

[fa icon='calendar'] Mar 7, 2018 9:39:02 AM / by Rob Scholl CISO @RISK posted in polymorphic, Insider, Cyber attack surface, Cyber Event

[fa icon="comment"] 0 Comments

Protecting your privacy: Anomymization the good & bad.

IP Anonymization is good, and bad - let's learn why.

Read More [fa icon="long-arrow-right"]

Consensus Theory Machine Learning reduces "Cyber Ghostbuster" Missions

[fa icon='calendar'] Aug 20, 2017 2:06:23 PM / by Rob Scholl CISO @RISK posted in Cyber attack surface, Cybersecurity requirements, MainStreet USA, MME, Privacy by design

[fa icon="comment"] 1 Comment

As a CISO, my challenge has been to reduce the number of alerts by filtering out the noise generated by a myriad of data sources.  I have to balance the latest "good idea" checklists and frameworks with the budget and staff that I have already.  As an Information Security expert, I have discovered that it is costly both financially and organizationally in staff morale to constantly having to conduct "Ghostbuster" missions that end like bad comedy through chasing ghosts in a machine that alerts us constantly and points us to a dead end.

Read More [fa icon="long-arrow-right"]

About At Risk technologies

[fa icon='calendar'] May 14, 2017 4:57:23 PM / by Allen Mitchell posted in Cyber attack surface

[fa icon="comment"] 0 Comments


INTRODUCTION OF @RISK:

@RISK Technologies, Inc., an IBM World Wide Strategic Embedded Solutions Partner, includes team members with decades of experience:

  • Composed of former IBM & MIlitary leaders they have supported the Department of Defense (DOD), U.S. Intelligence Agencies, U.S. Special Operations, the United States Army, the United States Marine Corps and the DOD CIO.
  • Over 50% of the team maintains Top Secret Security Clearance
  • Over 150 years of team experience at IBM
Read More [fa icon="long-arrow-right"]

What is a "Cyber Attack Surface?"

[fa icon='calendar'] Apr 3, 2017 5:28:10 PM / by John Santorum posted in Cyber attack surface

[fa icon="comment"] 0 Comments

Many define an attack surface as the total sum of the vulnerabilities in a given computing device or network that are accessible to a hacker.  As a Cadet at the Citadel, I learned that vulnerabilities are the dynamic interplay between Gaps and Capabilities.

Read More [fa icon="long-arrow-right"]

Cyber is Polymorphic "so what?"

[fa icon='calendar'] Mar 22, 2017 4:29:58 PM / by Rob Scholl CISO @RISK posted in Cyber attack surface, polymorphism, polymorphic

[fa icon="comment"] 2 Comments


INTRODUCTION TO POLYMORPHISM:

Every time you turn on the TV, or view social media, you can’t help but be overwhelmed with discussions around cyber security and hacking. Leaders of agencies, military units, or industries, consistently yield an interesting and recurring theme:

Cyber Security is "polymorphic."  Polymorphism, polymorphic or polymorph, from the Greek words poly ("many") and morphe ("form, shape, structure"), may refer to computing and science,  

  • Cyber Polymorphism represent the ability in computer programming to present the same programming interface for differing underlying forms (data types, classes) and then the substrate of Cyber extends all the way to how it is encoded.
    • Polymorphic code, self-modifying program code designed to defeat anti-virus programs or reverse engineering
Read More [fa icon="long-arrow-right"]