Remove .Net Remove Applications Remove Fractional CTO Remove Information Security
article thumbnail

Was This the World's First Fatal Cyberattack?

SecureWorld News

Germany's Federal Office for Information Security (BSI) says the attack occurred through a Citrix VPN vulnerability that has been known about since last year. If your own IT operations do not have the necessary skills to examine the systems for compromises, it is advisable to consult an external IT security service provider.".

article thumbnail

NJVC's Kevin L. Jackson Co-Authors INSA White Paper on Cloud.

Cloud Musings

Personal comments and insight on cloud computing related technologies and their use in the public sector to support net-centric operations. Information security must be baked into the cloud computing architecture from the very beginning. Cloudcuity Secure, Unified Cloud Management and Control Services. Newer Post.

Cloud 90
article thumbnail

The Hacker Mind Podcast: Hacking Real World Criminals Online

ForAllSecure

Let's take apart packet captures you know, Project Honey net was going well. than trying to find a vulnerability in an application from a high level perspective, right. And then, you know, not pay any fair, fair market prices on any consulting. I went to a private school, and so did our CTO, Elliot Anderson.