Blog Archives




 
  • Think before you click

    By Darnell Washington, CISSP - Tuesday November 20, 2012
    The recent resignation by Gen. David Petraeus due to an alleged email scandal brings to light one of my most common sense cyber security rules - think before you click. This should be a flashing neon light so that whenever there is content that may be...
  • The BYOD conundrum

    By Joel Griffin - Friday November 16, 2012
    The proliferation of smartphones and tablet computers has created a dilemma for security managers: How do you enable your workers to maximize their productivity while at the same time providing adequate protection against data breaches? There have...
  • Government IT security by the numbers

    By Paul Rothman - Friday November 9, 2012
    The same technology questions that drive private-sector IT security efforts are also driving government IT security. Just as it is in the private sector, it appears that government IT security is moving closer to understanding and embracing the benefits...
  • Do you want to play a cybersecurity game?

    By Darnell Washington, CISSP - Thursday November 8, 2012
    I’m sure that many of you remember the movie "Wargames," the popular Cold War science fiction film in which a young hacker unwittingly accesses WOPR, a United States military supercomputer programmed to predict possible outcomes of nuclear war. In the...
  • Navigating insurance claims post-Sandy

    By Eric Pritchard - Monday November 5, 2012
    Editor's note: Edward Dunham, an attorney with Kleinbard, Bell & Brecker, co-authored this blog entry. If your company recently suffered a power outage or other hurricane-related damage you may be tempted to put any potential insurance claim to the...
  • The top 25 worst passwords of 2012

    By Paul Rothman - Monday November 5, 2012
    While the old favorites remained the same, new words such as "welcome", "ninja", "jesus" and "mustang" highlight SplashData's annual list of the most common passwords used on the Internet and posted by hackers. Users of any of these passwords are the most...
  • Sandy's impact on security

    By Joel Griffin - Friday November 2, 2012
    The thoughts and prayers of the Cygnus Security Group go out to all those impacted this week by Superstorm Sandy, which left a path of destruction from the Outer Banks of North Carolina to the shores of Maine. The storm has been blamed for the deaths...
  • A fresh perspective on IT security

    By Darnell Washington, CISSP - Friday November 2, 2012
    It’s a pleasure to join Cygnus and SecurityInfoWatch.com. I am honored to participate in providing commentary to the public on views and opinions that bring to light what I would refer to as the "practical side" of cybersecurity. Through many of my...
  • Do we really need a cybersecurity executive order?

    By Joel Griffin - Friday October 26, 2012
    Despite pleas from lawmakers asking the White House to leave the responsibility of drafting legislation that adequately addresses the nation’s cyber threats to Congress, it appears that President Obama has grown tired of waiting. The Associate Press...
  • The business case for PSIM

    By Joel Griffin - Friday October 19, 2012
    On Thursday, physical security information management (PSIM) software provider VidSys released the results of its 2012 National Security Survey, which polled more than 100 senior security professionals from both the private and public sector about the...