Skip to content
Let's Find Your Solution: (800) 905-8622

Blog

ROLL YOUR OWN AV SIGNATURES

Kevin Wilkins CISSP – CTO iSecure LLC Roll Your Own AV Signatures There have been a lot of changes in AV and Host-Based Security in the past few years. It has become clear that there are many more instances of malware produced from day-to-day than legitimate software.  This causes AV signature databases to grow in…

Read More

KEVIN’S BROWSER CACHE AND FTC FOR THE HOLIDAYS

Kevin Wilkins, CTO iSECURE LLC Kevin’s Browser Cache and FTC For the Holidays FTC ruling against Oracle shows why it’s time to dump Java https://www.infoworld.com/article/3017792/security/ftc-ruling-against-oracle-shows-why-its-time-to-dump-java.html I agree and so does the author of this article.  Java is a pain in the butt and nobody should have it on their system.  Unfortunately it is still present…

Read More

EMAIL SECURITY – KNOW YOUR FILE TYPES!

Kevin Wilkins, Chief Technology Officer of iSECURE Email Security – Know Your File Types! OK, so maybe not. One of the oldest tricks in the email-attack handbook is to send an executable file (a program) to an unwitting recipient and disguise it as a benign document.  For example, a hiring manager might be sent “resume.exe”…

Read More

WOMEN IN TECHNOLOGY: THERE JUST AREN’T ENOUGH OF US

By Annette Warren, President and CEO of iSECURE There seems to be a great deal of interest in woman-owned businesses, specifically in Cybersecurity.  Certainly, it is an interesting topic for me as the President, CEO and owner of a Cybersecurity company. Most meetings and events that I attend, I look around the room and notice…

Read More

IF THE POTUS CALLS FOR STRONGER AMERICAN CYBERSECURITY, THEN WE MUST…..AND IT MUST BE A PROBLEM

By Felipe Sanchez Following a series of high profile breaches against US computer networks, President Obama called for “much more aggressive efforts to shore up the government’s vulnerable cyber-infrastructure”. Let’s just hope that the same approach is not pursued as the one taken with our internal physical infrastructure. What is positive about the president’s statements…

Read More

IF THE NSA IS READING THIS…

Donna Smith – Director of Marketing A few months ago, iSECURE hosted Cyber Security Strategies Summit in Rome, NY in which Chris Roberts, an esteemed keynote speaker from RSA, BlackHat, etc., was scheduled to speak. As you may know, Roberts had an encounter with the FBI on the way to our conference for tweeting about…

Read More

WE NEED TO AND MUST IMPROVE OUR INFORMATION SECURITY POSTURE…BUT HOW?

Felipe Sanchez – Information Security Consultant at iSECURE LLC A few days ago I shared an article on LinkedIn titled “FBI needs better intelligence, information sharing: U.S. report” ( https://news.yahoo.com/fbi-needs-better-intelligence-information-sharing-u-report-142005036.html ), which stated that the FBI has done great things from a law enforcement perspective, however lags in the cyber aspect and analysis. This had my…

Read More

EVOLVE YOUR INFORMATION SECURITY PRACTICE FOR TODAY’S WORK ENVIRONMENT

Christopher Caruana – Principal Consultant With all the complexity in today’s computing environment, how can IT regain control over data and reduce the growing risks for their business? The simple (but inefficient) solution would be to lock down access and force everyone to work only within the corporate LAN. Unfortunately, this is unacceptable in today’s…

Read More

MICROCONTROLLER FIRMWARE REWRITES ARE A REALLY BAD PROBLEM…

Kevin Wilkins CISSP – CTO iSecure LLC Destroying your hard drive is the only way to stop this super-advanced malware… https://www.pcworld.com/article/2884952/equation-cyberspies-use-unrivaled-nsastyle-techniques-to-hit-iran-russia.html State-sponsored hackers have malware which can install itself to the low level firmware running Hard Disk Drives.  This is similar to the exploits path for BIOS/UEFI viruses and BadUSB – malware is written to…

Read More

THE EVOLUTION OF MARKETING IN THE CYBER SECURITY INDUSTRY: WHAT’S A CCO??

Donna Smith – Director of Marketing iSecure LLC The Evolution of Marketing in the Cyber Security Industry: What’s a CCO?? It has been 6 years that I’ve been doing marketing in the cyber security industry, and it has definitely been a thought-provoking journey! Security challenges & solutions are rapidly evolving and everyone has their own…

Read More